How DBaD Trust Propagation Works
DBaD is designed to govern how trust moves across a trace, not just how one action is scored.
This visual shows the normal path from action to downstream trust use, the main points where DBaD constrains trust, and the resulting governance states when continuity, verification, lineage, or trajectory break.
Trust Flow Diagram
How to Read It
The top row shows the normal path: an action is reviewed, verified, propagated, and then relied on later. The middle row shows the main interruption points where DBaD can constrain trust instead of letting it move forward silently.
DBaD is not trying to prove everything. It is trying to make trust movement legible, constrain unsafe inheritance, and keep the reasons visible in the trace.
Legend
- Trust continues: no structural break prevents normal inherited trust.
- Trust constrained: trust can still matter, but only under tighter governing conditions.
- Trust halted: inherited trust is stopped because the path is structurally unsafe.
- Verification required: additional evidence or review is needed before trust can move forward.
Why This Matters
Most systems evaluate the endpoint. DBaD focuses on the path that produced the endpoint. That is where continuity breaks, borrowed trust, verifier capture, and lineage resets become visible.
Continue with what DBaD solves, the white paper v3, the known limits, or the research demo.