VALIDATORS
ai_vc_guide

VC / VP Validator — Developer Guide

This guide explains how to test Verifiable Credentials (VCs) and Verifiable Presentations (VPs) using the ai_vc.html page. It targets developers validating compliance across SD‑JWT VC, JWT VC, and JSON‑LD VC/VP formats with the relevant specifications (SD‑JWT VC Drafts and W3C VCDM 1.1).


1) Purpose of the Tool

Paste a VC/VP payload into the page and receive a structured compliance report. The tool can analyze:

Reports are format‑aware and check headers, payloads/claims, disclosures, cryptographic hints, and structural correctness according to the draft you select.


2) How to Use the Page

  1. Open ai_vc.html in your browser.
  2. In VC / VP payload, paste one of the supported formats:
  3. SD‑JWT VC: header.payload.signature~disclosure~...~kb-jwt
  4. JWT VC: header.payload.signature
  5. JSON‑LD VC / VP: a valid JSON object with @context and type
  6. Choose Analysis mode:
  7. Flash — quickest pass for dev loops/CI.
  8. 🧠 Escalation — deeper reasoning for edge cases.
  9. 👑 Pro — not available on this page.
  10. Pick Drafts:
  11. SD‑JWT VC Draft (e.g., 9).
  12. VCDM (W3C VC Data Model, e.g., 1.1) — used for JWT VC & JSON‑LD VC checks.
  13. Click Run Diagnostic and read the generated report.

Tips: Use the toolbar to Paste, Clear, or insert Samples. The character counter helps gauge payload size.


3) What the Reports Contain (by Format)

A) SD‑JWT VC Reports

The analyzer splits the token on ~ into the SD‑JWT, disclosures, and optional KB‑JWT. It decodes the JWT header/payload and attempts to verify signature context using one of:

If a Key Binding JWT is present (detected by the last part being a JWT), its header and payload are decoded.

Report sections include:

  1. Holder & Issuer Identifiers — e.g., cnf (holder key) and iss (issuer).
  2. Header Required Claims — checks for missing/invalid header fields (e.g., alg, kid, x5c / jwk).
  3. Payload Required Claims — checks for required SD‑JWT VC claims (including iss).
  4. Key Binding JWT Check — if present, verifies structural correctness (header/payload are proper JWT sections) and consistency.
  5. Signature Information — outcome/observations from x5c/jwk/DID/metadata key resolution attempts.
  6. Errors & Improvements — concrete issues and developer‑focused fixes.

Note: Disclosures are decoded and validated for format. Any decoding problems are flagged.

B) JWT VC Reports

For compact JWT VC, the analyzer decodes header/payload and checks conformance against VCDM (e.g., 1.1).

Report sections include:

  1. Holder & Issuer Identifiers
  2. All Claims — a readable list of claims found in the VC.
  3. Header Required Claims — missing/invalid header fields.
  4. Payload Required Claims — missing/invalid payload fields.
  5. Errors & Improvements — specific problems and remediations.

C) JSON‑LD VC / VP Reports

The analyzer reads the JSON‑LD and checks structure against VCDM.

Report sections include:

  1. Holder & Issuer Identifiers
  2. All Claims — lists fields and top‑level structure.
  3. Required Claims Check — for JSON‑LD VC/VP.
  4. Errors & Improvements — precise guidance on fixes.

4) Drafts & Standards

These choices directly affect required claims and validation logic in the report.


5) Analysis Modes


6) Attribution in the Report

Each report ends with attribution lines indicating:


7) Developer Best Practices


8) Disclaimer

This tool combines OpenAI models with Web3 Digital Wallet testing datasets to produce diagnostic reports.
They are not certifications. Always confirm against the official specifications and your conformance suite.