Skip to main content

Package Installation Logs

info

The English user guide is currently in beta preview. Most of the documents have been automatically translated from the Japanese version. Should you find any inaccuracies, please reach out to Flatt Security.

Paid Feature

This feature requires an active Takumi subscription with Guard enabled. See Pricing & Billing for details.

Package installation logs record every package download that passes through the Takumi Guard registry proxy. This gives your organization a searchable audit trail of all package installations across CI/CD pipelines and developer machines.

Installation log search UI

What Is Logged

Each log entry includes:

FieldDescription
TimestampWhen the download occurred
PackagePackage name and version
Ecosystemnpm or PyPI
PrincipalWho initiated the download (organization, bot, or anonymous)
StatusWhether the download was allowed or blocked

Viewing Logs

Navigate to Guard > Logs in the Shisho Cloud console. You can search by package name, filter by ecosystem (npm / PyPI), and specify a date range.

Use Cases

  • Incident response: When a package is flagged as malicious, quickly identify which pipelines installed it and when.
  • Compliance auditing: Maintain a record of all third-party dependencies consumed by your organization.
  • Supply chain visibility: Understand which packages are being installed across your organization and spot unusual patterns.

Retention

Installation log data is searchable for up to 14 days from the date of recording.

After the 14-day searchable period, log data is retained solely for breach notification purposes. Log data older than 90 days may be deleted.

When a subscription is cancelled, log data is deleted in accordance with the terms of service.

info

If you would like to extend the retention period, please contact your account manager. Depending on your contract and usage, we may not be able to accommodate all requests.