Stockyard writes every request, routing decision, and policy action to a hash-chained audit ledger. Tamper-evident. Exportable. Ready for enterprise review.
Every request through Stockyard is logged with full metadata: model, provider, tokens, cost, latency, status, and response.
Brand writes each event to a hash-chained ledger. Each entry references the previous hash. Tampering breaks the chain.
Set policies: data retention, access controls, approval gates. Iron hardens the platform. Grain controls per-key permissions.
Every routing decision Drover makes is logged with the quality score, cost estimate, and reason. Auditors can verify why each model was chosen.
See the data →When a compliance auditor asks where your LLM prompts are stored, the answer matters. If prompts flow through a third-party observability service, that service becomes part of your compliance surface. Their SOC 2 report, their data processing agreement, their breach notification timeline — all of it becomes your problem. Stockyard runs on your infrastructure, so the answer to "where is the data" is always the same: on servers you control, in a jurisdiction you chose.
The audit trail in Brand (formerly Trust) records every LLM request with its full context: prompt, completion, model, provider, active middleware, and timestamp. Records are hash-chained — each entry includes a SHA-256 hash of the previous entry, creating a tamper-evident log that satisfies audit requirements. The guardrails module blocks requests that match patterns you define before they reach the provider, so sensitive data never leaves your network in the first place. For HIPAA, SOX, GDPR, and SOC 2 environments, this architecture eliminates the compliance gap that SaaS observability tools create.
Install Stockyard, send a request, watch it flow through the middleware chain. Everything on this page starts working immediately.