DEV Community

GUARDIANCHAIN-GC1
GUARDIANCHAIN-GC1

Posted on

Verify an AI Governance Claim Across Six Blockchains in Five Minutes (Without Trusting the Vendor)

Most infrastructure asks you to trust it. You send data to a vendor, the vendor promises to handle it correctly, and later, if something goes wrong, you rely on the vendor's word, the vendor's logs, and the vendor's willingness to cooperate with your audit.
Forward verification inverts that. It is a property of infrastructure where any third party can check the vendor's claims independently, using only public data, without the vendor's cooperation, and without trusting the vendor at all. The vendor cannot lie, because the proof is not in the vendor's hands.
This article is a walkthrough. By the end of it, you will have taken a real capsule ID from GuardianChain's production system, verified its claims across six blockchains yourself, and understood the mechanism well enough to explain it to a colleague. The verification takes about five minutes. Everything you need is public.
What a capsule is
A GuardianChain capsule is a signed, hashed record of something that happened. It contains metadata about an event, a cryptographic hash of that event's content, and signatures proving who created it. The content itself stays with you; only the hash goes into the capsule. This is the non-custodial property: GuardianChain never holds your data, only the proof that your data existed at a specific moment.
Once a capsule is created, its hash is anchored into six independent blockchains: Base, Polygon, Ethereum, Optimism, Arbitrum, and Arweave. Anchoring means the hash is written into a transaction on each chain, so each chain now contains an immutable record that this specific capsule hash existed at this specific block height.
The forward verification claim is simple. Given a capsule ID, anyone can independently confirm that the capsule's hash appears in a transaction on each of those six chains, at the block height the capsule claims, with a signature that matches the public key the capsule claims. No GuardianChain API call is required for the verification itself. The blockchains are the source of truth.
The capsule we are going to verify
We are going to verify capsule e1a9a038-9938-4c63-a883-43e0ed21dfc6. This capsule is a RUNNING_STATE_AUDIT, produced on April 17, 2026, documenting a twelve-hour window of operational activity in GuardianChain's production system. It was created, anchored, and made retrievable through the platform's normal pipeline. Nothing about it is special. It is a working example.
Step 1: Retrieve the capsule metadata
Fetch the capsule record from GuardianChain's public DC-1 endpoint:
bashcurl https://gc-1-production.up.railway.app/api/dc1/capsule/e1a9a038-9938-4c63-a883-43e0ed21dfc6
You will get back a JSON object containing the capsule's hash, creation timestamp, anchor transaction hashes for each of the six chains, and the signing public key. Save this response. Everything that follows uses fields from it.
The key insight: GuardianChain is only giving you the pointers. The actual proof lives on chains GuardianChain does not control.
Step 2: Verify on chain one (Base)
Take the base_tx_hash field from the response. Go to the Base block explorer:
https://basescan.org/tx/
You will see the transaction on-chain. Look at the transaction's input data. Embedded in it is the capsule hash. Copy that hash. Confirm it matches the content_hash field in the capsule JSON you retrieved in Step 1.
That is one chain verified. Base's operators do not know GuardianChain exists. Base simply records that at a specific block, at a specific timestamp, a specific hash was written into a transaction. The hash matches. The claim holds.
Step 3: Repeat on the remaining five chains
Do the same thing on each of the other five anchors:

Polygon: https://polygonscan.com/tx/
Ethereum: https://etherscan.io/tx/
Optimism: https://optimistic.etherscan.io/tx/
Arbitrum: https://arbiscan.io/tx/
Arweave: https://viewblock.io/arweave/tx/

Each explorer is operated independently. Each chain is operated independently. The hashes all match. The timestamps all fall within the batch window you would expect for a capsule anchored through a Merkle-batched pipeline.
Step 4: Verify the signature
The capsule metadata includes a signature and a public key. Take the capsule's canonical serialized form (the JSON with fields in a defined order, specified in GuardianChain's public schema), compute its SHA-256 hash, and verify the signature against the public key using any standard Ed25519 library:
javascriptconst nacl = require('tweetnacl');
const verified = nacl.sign.detached.verify(
messageHash,
signatureBytes,
publicKeyBytes
);
console.log(verified); // true
You now have end-to-end proof. The capsule was signed by the holder of a specific private key. The hash of the capsule appears on six independent blockchains. The blockchains were written to at times that predate this moment, meaning no one could have forged this record after the fact without also forging history on six chains simultaneously, which is economically and cryptographically infeasible.
Why this matters
You just verified a claim about an AI governance event without calling GuardianChain's API for anything except the pointer lookup, and even that lookup could be replaced with a local cache or a mirror. The verification itself ran against public blockchain data, using public explorers, using standard cryptographic libraries.
This is what forward verification means as a property. It is not a claim the vendor makes about their own reliability. It is a mathematical structure that makes the vendor's reliability irrelevant. If GuardianChain disappeared tomorrow, every capsule ever created would remain verifiable forever, by anyone, using the same steps you just followed.
For AI governance, this property matters because the alternative is trust. Regulators and auditors currently have to trust that vendor logs are accurate, that vendor timestamps are honest, and that vendor cooperation will be available when needed. Forward verification removes all three dependencies. A capsule either verifies, or it does not. The vendor's posture is not part of the answer.
What to do next
If you want to try this on a capsule you create yourself, the CLI is at npm install -g @guardianchain/cap. Documentation and the public verification endpoint live at guardianchain.io. The MCP tool gc1_forward_verify does the above steps programmatically inside any MCP-capable LLM client.
If you found this useful, the most valuable thing you can do is explain it to another developer. Forward verification only becomes the default expectation for AI governance infrastructure if enough people know it is possible.

Top comments (0)