
Verifiability features
| Feature | Explanation |
|---|---|
| Intent hashing | Each user’s workflow intent is hashed and logged with their signature |
| Execution logs | Actions, inputs, results, and metadata are logged in Merkle-tree-based structures |
| Verifier reports | Verifier nodes post zero-knowledge proofs or full logs to validate action correctness |
| Auditability | Any third party or regulator can replay and verify historical workflow executions |
Intent hashing
When a user submits a workflow, the complete YAML definition is cryptographically hashed and stored on Kalp Chain alongside the user’s signature.- Proves the user authorized the specific workflow
- Cannot be altered after submission
- Serves as the reference for all verification
Execution logs
All workflow executions generate detailed logs stored in Merkle-tree-based structures on Kalp Chain.Logged data
| Data type | Description |
|---|---|
| Trigger data | The event or condition that activated the workflow |
| Input parameters | All values passed to workflow actions |
| Action results | Outputs and return values from each action |
| State transitions | Changes to on-chain state caused by the workflow |
| Timestamps | Precise timing of each execution step |
| Node identity | Which execution node processed the workflow |
Merkle tree structure
Execution logs are organized in Merkle trees, enabling:- Efficient verification: Verify specific log entries without downloading entire history
- Tamper detection: Any modification invalidates the Merkle root
- Compact proofs: Generate small proofs for specific execution claims
Verifier reports
Verifier nodes submit reports to Kalp Chain that attest to execution correctness.Report types
Zero-knowledge proofs
Cryptographic proofs that verify execution without revealing sensitive data
Full execution logs
Complete step-by-step records of workflow re-computation
Report contents
Each verifier report includes:- Reference to the original intent hash
- Execution proof from the executor node
- Verifier’s independent computation result
- Attestation or dispute status
- Verifier node signature
Auditability
Any third party or regulator can replay and verify historical workflow executions using the public records on Kalp Chain.Audit process
1
Retrieve intent
Fetch the original workflow definition and user signature from Kalp Chain using the intent hash.
2
Retrieve execution logs
Download the Merkle-proofed execution logs for the specific workflow execution.
3
Replay execution
Using the logged trigger data and inputs, independently re-execute the workflow logic.
4
Compare results
Verify that the replayed execution matches the logged results and verifier attestations.
Audit use cases
| Use case | Description |
|---|---|
| Regulatory compliance | Demonstrate automated actions followed approved policies |
| Dispute resolution | Provide evidence in case of contested transactions |
| Security audits | Verify no unauthorized actions were executed |
| Operational review | Analyze workflow performance and behavior |
Benefits of public verifiability
For users
- Transparency: See exactly what actions were taken on your behalf
- Accountability: Hold execution nodes responsible for their actions
- Trust: Verify without relying on any single party
For enterprises
- Compliance: Meet regulatory requirements for audit trails
- Risk management: Independently verify automated operations
- Due diligence: Audit third-party workflow providers
For the network
- Integrity: Ensure all participants follow the rules
- Decentralization: Remove reliance on trusted intermediaries
- Security: Detect and penalize malicious behavior
Accessing verification data
Kwala Explorer
The Kwala Explorer provides a user-friendly interface to:- View workflow execution history
- Inspect execution logs and proofs
- Verify specific transactions
- Download audit reports
Kalp Chain direct access
Developers can query Kalp Chain directly to:- Retrieve raw execution proofs
- Verify Merkle proofs programmatically
- Build custom audit tools
- Integrate verification into applications
