Skip to content

Commit 62f208e

Browse files
rosschurchillclaude
andcommitted
feat: Phase 1 Compliance - Logging & Audit Foundation (v2.3.0)
New src/compliance/ module with enterprise-grade audit logging: ## Audit Logger (audit-logger.ts) - Structured events with full attribution (actor, resource, outcome) - Hash-chained integrity for tamper detection - Event categories: auth, access, modify, delete, export, admin, security - Severity levels: info, low, medium, high, critical - Compliance tagging (SOC2, GDPR, PCI-DSS, ISO27001) ## Log Formats - CEF (Common Event Format) for SIEM integration - JSON-LD for compliance tools and knowledge graphs ## Log Shipping (log-shipper.ts) - Webhook (HTTPS POST) - Syslog (RFC 3164 / RFC 5424) - S3/GCS cloud storage (placeholder) - Batching and retry ## Retention Manager (retention-manager.ts) - Daily/weekly/size-based rotation - Compression (gzip) - Secure deletion with certificates - Configurable retention (default: 365 days) ## Log Verifier (log-verifier.ts) - Hash chain verification - Sequence continuity checking - Gap and tampering detection - Verification certificates Part of Compliance Roadmap: SOC2, GDPR, PCI-DSS 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <[email protected]>
1 parent 7fd11ad commit 62f208e

File tree

10 files changed

+3059
-2
lines changed

10 files changed

+3059
-2
lines changed

CHANGELOG.md

Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,77 @@ All notable changes to Chrome MCP Secure will be documented in this file.
55
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
66
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
77

8+
## [2.3.0] - 2025-12-15
9+
10+
### Added
11+
12+
#### Phase 1: Logging & Audit Foundation (Compliance Roadmap)
13+
14+
New `src/compliance/` module with enterprise-grade audit logging:
15+
16+
- **Compliance Audit Logger** (`src/compliance/audit-logger.ts`)
17+
- Structured audit events with full attribution (actor, resource, outcome)
18+
- Hash-chained integrity for tamper detection
19+
- Event categories: auth, access, modify, delete, export, admin, security, error, system
20+
- Severity levels: info, low, medium, high, critical
21+
- Compliance tagging (SOC2, GDPR, PCI-DSS, ISO27001)
22+
23+
- **CEF Formatter** (`src/compliance/formats/cef.ts`)
24+
- Common Event Format for SIEM integration
25+
- Splunk, ArcSight, QRadar, LogRhythm compatible
26+
- RFC-compliant CEF output
27+
28+
- **JSON-LD Formatter** (`src/compliance/formats/json-ld.ts`)
29+
- Linked Data format for compliance tools
30+
- schema.org vocabulary
31+
- Machine-readable audit trails
32+
33+
- **Log Shipper** (`src/compliance/log-shipper.ts`)
34+
- Webhook shipping (HTTPS POST)
35+
- Syslog support (RFC 3164 / RFC 5424, UDP/TCP)
36+
- S3/GCS cloud storage (placeholder)
37+
- Batching and retry with exponential backoff
38+
39+
- **Retention Manager** (`src/compliance/retention-manager.ts`)
40+
- Log rotation (daily/weekly/size-based)
41+
- Compression of old logs (gzip)
42+
- Secure deletion with cryptographic certificates
43+
- Configurable retention periods (default: 365 days)
44+
- Archive support
45+
46+
- **Log Verifier** (`src/compliance/log-verifier.ts`)
47+
- Hash chain integrity verification
48+
- Sequence continuity checking
49+
- Gap detection
50+
- Tampering detection
51+
- Verification reports and certificates
52+
53+
### Environment Variables (New)
54+
55+
#### Audit Logging
56+
- `CHROME_MCP_AUDIT_ENABLED` - Enable/disable audit logging (default: true)
57+
- `CHROME_MCP_AUDIT_FORMAT` - Output format: jsonl, cef, json-ld (default: jsonl)
58+
- `CHROME_MCP_AUDIT_DIR` - Audit log directory
59+
- `CHROME_MCP_AUDIT_MIN_SEVERITY` - Minimum severity to log
60+
- `CHROME_MCP_AUDIT_HASH_CHAIN` - Enable hash chaining (default: true)
61+
62+
#### Log Shipping
63+
- `CHROME_MCP_LOG_SHIPPING` - Enable log shipping (default: false)
64+
- `CHROME_MCP_LOG_DESTINATION` - Destination: webhook, syslog, s3, gcs
65+
- `CHROME_MCP_WEBHOOK_URL` - Webhook endpoint URL
66+
- `CHROME_MCP_SYSLOG_HOST` - Syslog host (default: localhost)
67+
- `CHROME_MCP_SYSLOG_PORT` - Syslog port (default: 514)
68+
- `CHROME_MCP_SYSLOG_PROTOCOL` - UDP or TCP
69+
70+
#### Retention
71+
- `CHROME_MCP_LOG_RETENTION_DAYS` - Retention period (default: 365)
72+
- `CHROME_MCP_LOG_ROTATION` - Rotation strategy: daily, weekly, size
73+
- `CHROME_MCP_LOG_COMPRESS` - Compress old logs (default: true)
74+
- `CHROME_MCP_LOG_COMPRESS_AFTER` - Days before compression (default: 7)
75+
- `CHROME_MCP_SECURE_DELETE` - Secure wipe before deletion (default: true)
76+
77+
---
78+
879
## [2.2.1] - 2025-12-11
980

1081
### Fixed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
**Chrome DevTools Protocol automation for AI agents - with enterprise-grade security**
66

7-
[![Version](https://img.shields.io/badge/Version-2.2.1-brightgreen.svg)](./CHANGELOG.md)
7+
[![Version](https://img.shields.io/badge/Version-2.3.0-brightgreen.svg)](./CHANGELOG.md)
88
[![TypeScript](https://img.shields.io/badge/TypeScript-5.x-blue.svg)](https://www.typescriptlang.org/)
99
[![MCP](https://img.shields.io/badge/MCP-2025-green.svg)](https://modelcontextprotocol.io/)
1010
[![Security](https://img.shields.io/badge/Security-Hardened-red.svg)](./SECURITY.md)

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "@pansec/chrome-mcp-secure",
3-
"version": "2.2.1",
3+
"version": "2.3.0",
44
"description": "Security-hardened Chrome DevTools Protocol MCP server with post-quantum encryption and secure credential vault",
55
"type": "module",
66
"main": "dist/index.js",

0 commit comments

Comments
 (0)