This section provides six reproducible walkthroughs that demonstrate the HATS verifier's behavior against governance bundles in distinct states: valid, tampered, chain-broken, signature-invalid, and replay-deterministic. Each walkthrough specifies the exact JSON input, the CLI command to execute, the expected verifier output, and the verification logic that produces that output.
These walkthroughs are intended for implementors building independent verifiers, auditors validating HATS deployments, and operators performing acceptance testing. Each walkthrough is self-contained and can be executed against any conformant HATS verifier implementation.
predecessor_hash field contains the SHA3-256 digest of the preceding node's canonical serialization. The first node's predecessor hash is the null hash (32 zero bytes).The following walkthroughs cover the five primary verification scenarios. Each is a separate page with full JSON input, CLI commands, expected output, and detailed explanation.
A complete valid governance bundle with 3 nodes. Step-by-step verification procedure producing a VERIFIED result. Demonstrates correct hash chain linking, signature verification across three PQ families, and temporal ordering validation.
A valid bundle with one node's action_type field modified after signing. Demonstrates hash mismatch detection: the verifier identifies the specific node and field that diverged from the signed content.
A bundle with a deleted node producing a gap in the predecessor chain. The verifier detects the chain discontinuity by comparing the expected predecessor hash against the actual preceding node's digest.
A bundle containing a corrupted ML-DSA-65 signature on one node while FALCON-512 and SLH-DSA remain valid. Demonstrates the AND-gate requirement: one invalid family invalidates the entire attestation.
The same bundle replayed at the same timestamp across 100 iterations. Demonstrates byte-identical frame hash output. Confirms that the verifier is a pure function of its inputs with zero environmental dependency.
All walkthroughs assume the HATS Verifier CLI is installed and available on the system PATH. The CLI is distributed as a statically-linked binary for Linux (x86_64, aarch64) and macOS (Apple Silicon).
brew install h33ai-postquantum/tap/hats-verifier (macOS) or download from the H33 GitHub releases.hats version should print the verifier version and linked cryptographic library versions.Each walkthrough specifies exact JSON inputs and expected outputs. A conformant verifier implementation MUST produce byte-identical output for the same input. The SHA3-256 digests and verification results in these walkthroughs serve as conformance test vectors.
If your verifier produces different output for any walkthrough input, the implementation is non-conformant. See the Conformance Suite for the full test vector set.