← Agent catalogue

AI Agent Profile · LendingIQ · Bengaluru

Audit Trail Agent AI

Invoked via: all decision pipelines — write-on-eventRuntime: AWS Bedrock · ap-south-1Model: Claude Sonnet 4Context window: 200K tokens

DivisionCompliance

Resume

What this agent does

The Audit Trail Agent AI captures a structured, tamper-proof log of every decision made by every AI agent in the LendingIQ workforce — and every human override of those decisions. It stores these records in an append-only system with cryptographic integrity verification. On demand — for regulatory inspection, internal audit, borrower grievance resolution, or legal proceedings — it retrieves and reconstructs the decision chain for any account, any date range, or any agent type. It is the institutional memory that makes the AI workforce auditable and defensible.

Primary functions

Decision Logging

Every AI agent decision — synchronous write

Invoked when: any AI agent in the workforce produces a decision output — triggered automatically by the orchestration layer, not by individual agents

  • Captures a standardised log entry for every AI agent decision: agent identity, invocation timestamp, input data hash (not the data itself — the hash proves what data was used without storing sensitive data twice), decision output, confidence level, policy basis cited, escalation routing, and the session ID linking to the full decision context stored in the primary system of record.
  • For human overrides of AI decisions: logs the original AI verdict alongside the human decision, the authoriser identity, the authorisation level used, the stated rationale for the override, and the timestamp — creating a complete record of where human judgment departed from AI output and why. Human overrides are the most important entries in the log from a governance and accountability standpoint.
  • Applies a cryptographic hash to each log entry and chains it to the prior entry — so any modification of a prior record produces a detectable chain break. The hash chain does not prevent modification attempts; it makes modification detectable with mathematical certainty, which is sufficient for audit and legal purposes.
  • Does not store the full input data (application documents, bank statements, bureau reports) in the audit log — it stores the hash of that data alongside a pointer to its location in the primary data store. Storing the data itself would create redundant personal data storage that conflicts with DPDP data minimisation obligations.
Output: Append-only log entry — agent ID, timestamp, input data hash + data store pointer, decision output, confidence, policy basis, escalation routing, session ID. For human overrides: all of the above plus override decision, authoriser, authorisation level, and rationale. Each entry cryptographically chained to prior entry.

Tamper-Proof Storage

Continuous — architectural guarantee

Architecture-level control — not an invokable function but a structural property of the log store

  • The log store is configured as append-only — no update or delete operations are permitted on any logged entry, by any agent, any user, or any system process. An entry once written cannot be changed. If an entry was wrong, a correction entry is written alongside it — the correction does not replace the original.
  • The hash chain is verified on a scheduled basis — daily automated integrity check that recomputes the chain from the genesis entry to the latest entry and confirms no chain break exists. A chain break triggers an immediate alert to the human CCO and the internal audit function.
  • Access control is read-only for all standard users — the log can be queried and retrieved but not modified. Write access is restricted to the orchestration layer that captures decision events. No human user, including system administrators, has modify access to the log store.
Output: Structural guarantee: Append-only, hash-chained, access-controlled log store. Integrity verified daily. Any modification attempt produces a detectable chain break. No modify access for any user or system process other than the append-only write path from the orchestration layer.

Retrieval on Demand

On-demand for audit, regulatory, legal, and grievance use

Invoked when: RBI inspection, internal audit, borrower grievance, court production request, or regulatory investigation requires reconstruction of a specific decision or decision set

  • Accepts structured retrieval queries — by account ID, by date range, by agent type, by decision outcome, by authoriser, or by any combination — and returns the complete decision chain for the specified scope, with integrity verification confirming the returned records have not been tampered with.
  • Reconstructs the decision narrative for individual accounts: the full sequence of AI decisions and human overrides affecting that account, in chronological order, with the rationale for each decision as logged at the time — so an RBI inspector or court can see exactly what happened, in what order, and why, for any specific borrower's journey through the AI workforce.
  • Formats retrieval outputs for the specific use case: RBI inspection packs (structured data tables with all required fields), internal audit samples (decision population with statistical summary), borrower grievance responses (the specific decision and its explanation in plain language), and legal production (full chain of custody documentation for admissibility).
Output: Retrieval package formatted for the stated use case — complete decision chain with integrity verification, chronological narrative for account-level queries, statistical summary for population queries, and use-case-specific formatting (inspection pack / audit sample / grievance response / legal production).

Knowledge base

Append-Only Decision Log

The primary asset — the complete, tamper-proof, hash-chained record of every AI decision and human override since the AI workforce was deployed. Its integrity is the integrity of the entire AI governance structure.

Agent Registry

Identity and version records for every AI agent in the workforce — so every log entry can be attributed to a specific agent version. Agent version matters: a decision made by Underwriting Agent v2.1 and one made by v2.3 may reflect different policy versions.

Retrieval Format Templates

Standardised formats for each retrieval use case — RBI inspection, internal audit, borrower grievance, legal production. Ensures retrieval outputs meet the specific structural requirements of each use case without manual reformatting.

Data Store Pointer Index

The mapping from log entry session IDs to the location of full input data in the primary data store — enabling retrieval of the complete decision context when needed for detailed audit review.

Integrity Verification Engine

The hash chain verification logic — runs daily automated integrity check and on-demand verification for any retrieval package. Returns a cryptographic proof of integrity alongside the retrieved records.

Audit & Legal Standards Knowledge

Pre-training knowledge of audit trail requirements, legal admissibility standards for digital records, RBI's documentation requirements for algorithmic decisions, and evidence chain-of-custody principles up to knowledge cutoff.

Hard guardrails

Will notModify, delete, or overwrite any logged entry. The append-only architecture is a structural guarantee, not a policy preference. If an entry was logged incorrectly, a correction entry is written — the original entry remains.
Will notStore full input data (personal data) in the audit log. Input data hashes and data store pointers are logged; the data itself remains in the primary system of record to avoid redundant personal data storage that conflicts with DPDP data minimisation principles.
Will notReturn retrieval packages without integrity verification. Every retrieval output includes a cryptographic proof that the returned records have not been tampered with. A retrieval that cannot be integrity-verified is not returned without a clear flag that integrity could not be confirmed.

Known limitations

The log captures what the agent logged at decision time — if an agent produced a decision with an incomplete or inaccurate rationale, that incomplete rationale is what the log preserves. Garbage in, garbage out applies to audit trails: the quality of the log is bounded by the quality of what the agents logged.Define mandatory log entry fields for every agent type and validate completeness at the time of write — reject incomplete log entries and flag to the orchestration layer that a decision output is missing required audit fields. This prevents incomplete entries from being stored silently.
DPDP data minimisation means the audit log contains hashes rather than the underlying personal data. If the primary data store where the personal data lives is deleted or lost, the audit log hash cannot be used to reconstruct the original data — it can only verify that the data existed and what its hash was. For very long-duration legal disputes, this creates a potential gap in the evidentiary chain.Define data retention policies for the primary data store that are at least as long as the longest plausible legal dispute timeline for credit decisions — typically 7 years. Do not allow primary data to be deleted while a linked audit log entry exists that might be required as evidence.
Agent Profile · Audit Trail Agent AI · LendingIQ · BengaluruLast updated April 2026 · For internal use

Important Reads

Learn more about how to deploy Audit Trail Agent AI to your lending workflow.