Guide
System Integrity Monitoring for Individuals and Small Teams
The operating model anchor for lightweight baseline-first integrity practice.
Read moreFREE LINUX CLI AVAILABLE NOW!
AuditWalk helps you compare filesystem state against a trusted baseline, detect system drift, and build reviewable repair plans through a clear workflow. Built for environments where automated activity makes system integrity harder to take for granted.
Getting Started
Linux CLI is available now. Additional platforms are in development. Get $9 off the full license today, including priority release notifications, upcoming GUI access during your license term when shipped, and automation features as they ship.
Where AuditWalk Fits
AuditWalk can serve different kinds of users who all share one common need: they want a clearer way to establish a trusted reference, detect change, and review drift before taking action. The profiles below show several examples you may identify with.
Explore Example Scenarios
If one or more of these profiles feels relevant, explore the use cases page. It walks through realistic scenarios and shows how baseline establishment, preflight checks, compare runs, and repair planning apply in practice.
Crypto & Blockchain
Baseline before trust-bound moves.
Before moving funds or running high-value wallet workflows, capture a verified system reference so you can compare afterward and confirm nothing unrelated changed.
Autonomous Agents
Agents act on your behalf. Verify what they actually did.
When automation operates on your system, establish a reference before the run and compare afterward so changes are visible, reviewable, and attributable.
IT Service Providers
Baseline at intake. Compare on every callback.
Establish a reference when a machine is received, serviced, or returned. Later compares create a clear record of what changed between visits.
Developers & SRE
Configuration drift happens. Catch it before it matters.
In technical environments, compare current state against an accepted reference across deployments and maintenance windows to surface meaningful drift.
After Remote Access
Someone had access. Find out what changed.
When a contractor, technician, or support session touches a machine, compare post-session state against a prior reference to identify what changed in that window.
Suspicious Activity
You clicked something. Determine whether it changed the system.
After suspicious downloads or unexpected prompts, use Preflight or Compare to inspect what changed before deciding whether deeper action is warranted.
Core Workflow
AuditWalk separates observation from trust. A scan captures the system as it exists at a given moment, but it does not automatically declare that state safe, approved, or trustworthy. That distinction matters. Observation is technical; trust is deliberate.
When you confirm a baseline, you are establishing a known reference point — a state you have reviewed and accepted as the standard for future comparison. From there, AuditWalk compares new observations against that trusted baseline so changes can be identified, reviewed, and judged with context.
Captures the current filesystem state. Pure observation — no claim about whether the system is good or trusted.
Your deliberate sign-off: "I've reviewed this scan and vouch for it as the trusted state." Enables downstream workflows that rely on a confirmed baseline.
Fast, targeted verification of specific areas against the baseline. Faster than a full compare.
Full drift detection across the entire scope. Produces structured findings against the confirmed baseline.
Interprets drift evidence and recommends safe next actions.
Generates a reviewable repair plan. Nothing executes without explicit approval.
Example command: auditwalk scan run --profile full
Runs a read-only scan of the current filesystem and saves the result as a versioned artifact. This command records what exists on the system at that moment, giving AuditWalk a concrete observation to review and preserve. A scan does not declare the system trusted; it creates the evidence from which trust can later be established.
scan_id for traceabilityquick, full, and paranoid profilesauditwalk baseline confirm <scan_id>
Marks a reviewed scan as trusted baseline state. This is an explicit operator action: AuditWalk does not auto-confirm trust. Once baseline exists, later observations gain context.
scan_idauditwalk preflight run --path /etc
Runs a scoped verification pass against the active baseline. Use when you need fast confidence in targeted directories without running full-system compare.
auditwalk compare run
Performs full drift detection between current state and confirmed baseline. Produces structured findings that can be exported, reviewed, or escalated into Doctor and Repair workflows.
auditwalk doctor run --compare-id <compare_id>
Interprets findings and helps prioritize what likely matters in the workflow.
auditwalk repair plan --doctor-id <doctor_id>
Builds a deliberate, reviewable repair plan from confirmed findings and recommendations. Execution remains explicit and operator-approved.
Guide
System Integrity Monitoring for Individuals and Small Teams
The operating model anchor for lightweight baseline-first integrity practice.
Read moreGuide
What to Do After Suspected System Drift
An evidence-first response checklist for high-stress moments when trust state is unclear.
Read moreGuide
How to Know What Changed on Your Linux System
A baseline-first workflow to move from uncertainty to evidence-backed change visibility.
Read moreGuide
Preflight vs Compare: When to Use Each on Linux
A practical decision guide for fast readiness checks versus full baseline drift analysis.
Read moreGuide
Trusted Baseline vs Snapshot vs Backup
Three related controls with different jobs: trust reference, point-in-time image, and recovery copy.
Read moreUpdate
Observer Doctrine Refinement
Phone and tablet witness model finalized for high-trust operator workflows.
Read moreEngineering
Last Trusted State vs Signature Detection
Signature detections identify known artifacts. State models identify unexpected drift before action.
Read moreEngineering
Preflight Result v1 Contract
Contract-focused reference for preflight output semantics, structure, and operator interpretation.
Read morePattern
Interval-Regular Authentication Attempts
Pattern analysis of interval-regular auth attempts and how to triage persistence-related risk in context.
Read more