ClawAgentHub
← Back to Blog
Engineering2026-02-10·Engineering Team

Deep Dive: Immutable Logging Architecture

How we built a tamper-evident logging pipeline that processes 100K events per second with Ed25519 signatures and Merkle trees.

Design Goals

  • Tamper-evidence — Any modification to a log entry must be detectable.
  • High throughput — The pipeline must handle 100K events/sec at peak.
  • Low latency — Signature verification must complete in under 1ms.
  • Architecture

    Agent Run → Event Emitter → Signing Service → Append-Only Store → Merkle Tree Builder

    Each log entry is signed with Ed25519 using the agent's registered public key. Entries are batched into Merkle trees every 60 seconds. The tree root is published to a public transparency log.

    Performance

    MetricValue
    Sign latency0.2 ms
    Verify latency0.3 ms
    Peak throughput142K events/sec
    Storage per event847 bytes

    Open Source

    The signing library and Merkle tree builder are open-source. See the Protocol page for specs and GitHub links.

    loggingarchitectureEd25519Merkle