Basically, we could give non-superuser ssh access to one of the security folks that we trust, so that they could at any time, ssh in and verify the logs are not being kept. Then they publish what they find periodically. Kind of like how companies do independent security audits.
Discussion
What about this? https://audgit.ai/
Auditing the code is not enough, we would need to audit the state of the server since most of these servers allow ssh access the state of the system can be changed at any time by an operator.