Provenance Vault · Forensics

Cryptographic
Chain Validation

Merkle proofs, full chain validation, and third-party verifiable integrity for every record in the Provenance Vault. Prove any entry is untampered without exposing the rest of the chain.

Chain Validation Report
SHA-256
Merkle Trees
Chain Validation
Third-Party Verifiable

Capabilities

Cryptographic proof of every AI governance decision.

Entry Verification

Verify any individual entry's integrity by recomputing its SHA-256 hash against the stored value.

  • Hash Recomputation
  • Integrity Check
  • Instant Results

Chain Walk

Walk the entire chain from any entry back to genesis, verifying every link in the sequence.

  • Full Chain Traversal
  • Link by Link Verification
  • Gap Detection

Merkle Proofs

Generate compact cryptographic proofs that any entry exists in the chain without revealing other entries.

  • Compact Proofs
  • Privacy Preserving
  • Third-Party Verifiable

How It Works

Xybern provides cryptographic verification tools for proving the integrity of any record in the Provenance Vault.

01

Entry Selected

Choose any verification record from the Provenance Vault to validate its integrity and chain position.

02

Proof Generated

Cryptographic proof is computed from the entry hash through the Merkle tree to the root, creating a verifiable path.

03

Integrity Confirmed

Proof is verified against the published root hash, confirming the record is untampered and authentic.

Entry Hash

SHA-256 hash of selected verification record

Merkle Path

Sibling hashes along proof path through the tree

Tree Root

Computed root hash from proof path recombination

Verification

Computed root matches published root — integrity confirmed

Merkle Proof Structure

The cryptographic proof format used for third-party verification of any entry in the chain.

merkle_proof.json
{
  "entry_id": "ent_1847",
  "entry_hash": "sha256:a7f3b9c2d4e1f5...",
  "proof": {
    "leaf": "sha256:a7f3b9c2d4e1f5...",
    "path": [
      {"hash": "sha256:b2c8e1f5...", "position": "right"},
      {"hash": "sha256:d4e1a7f3...", "position": "left"},
      {"hash": "sha256:f7a3c2b8...", "position": "right"}
    ],
    "root": "sha256:9c2d4e1f5a7b3..."
  },
  "verified": true,
  "verified_at": "2025-01-15T14:35:00Z"
}

Verification Methods

Three independent methods to verify the integrity of any record in the Provenance Vault.

Entry Hash

Recompute the SHA-256 hash of any entry and compare against the stored value for instant integrity verification.

Chain Walk

Traverse the chain from any entry back through every predecessor, verifying hash links at each step.

Merkle Proof

Generate a compact cryptographic proof path from any entry to the Merkle root for third-party verification.

API Reference

API Endpoint

Retrieve Merkle proofs programmatically for any entry in the Provenance Vault.

GET /api/sentinel/vault/v2/entries/{id}/proof

Returns the full Merkle proof path for the specified entry, including proof type, sibling hashes, root hash, and verification status.

Instant Verification

The response includes the verified boolean and the chain depth, enabling immediate integrity confirmation.

api_request.json
GET /api/sentinel/vault/v2/entries/ent_1847/proof

// Response
{
  "entry_id": "ent_1847",
  "proof_type": "merkle",
  "proof_path": ["sha256:b2c8...", "sha256:d4e1...", "sha256:f7a3..."],
  "root_hash": "sha256:9c2d4e1f...",
  "verified": true,
  "chain_depth": 1847
}

Prove Every Record

Cryptographic proof of integrity for every AI governance record in the Provenance Vault.