Skip to main content
Sign in
← avoid.net

Verify a decision

Every moderation decision on AVOID.NET is anchored to the Solana blockchain. You don't have to trust us — you can verify cryptographically that we committed to a verdict at a specific moment and have not rewritten it.

How verification works

  1. We commit. When a moderator accepts/rejects a submission, we serialize the decision into deterministic UTF-8 bytes (payload_canonical_string), hash it with SHA-256, encode the digest as base58, and write it to Solana inside an SPL Memo v2 transaction.
  2. We store the bytes. The exact bytes we hashed are stored alongside the decision in our database. Anyone can read them and recompute the hash in any language.
  3. You compare three values. Database hash, your independently-recomputed hash, and the hash inside the on-chain memo. If all three match, the decision is authentic and timestamped.
The on-chain memo format is AVOID.NET|v1|h:<b58-sha256>|d:<id>|t:<iso>

Find a signature on any investigation page's decision log, or run python -m src.verify_decision --signature <sig> for a CLI check.

Decision
review_revise · Phantom Wallet
View on Solana ↗
Sequence
#2
Score
7469 (-5)
Cluster
mainnet-beta
Slot
417878551
Off-chain at
2026-05-06T02:50:06.659Z
Anchored at
Block time

Independent verification

1. Database (off-chain)
ELUE9SbUiZfpXNpekWfiHKsXEFV8v1WMvmVm753SRWDM
2. Recomputed (your browser)
computing…
3. On-chain (Solana memo)
fetching…
Canonical bytes hashed (871 chars)
{"actor":"judge","decided_at":"2026-05-06T02:50:06.503Z","decision":"review_revise","investigation_id":"534e51fc-2dbe-42e6-86ff-3f144efce521","new_score":69,"page_slug":"phantom-wallet","prev_score":74,"reason":"The investigation is well-sourced and broadly accurate, but the reviewer identified three correctible errors: the Solana web3.js compromised version is listed as 1.96.7 when it should be 1.95.7, the timeline attributes CFTC Staff Letter 26-09 to the Division of Enforcement instead of the Market Participants Division, and the August 2022 exploit loss estimate of $5-7M skews above cited sources ($4-6M). None of these errors materially misrepresent risk, but they warrant revision before the page is fully approved.","score_delta":-5,"sequence_num":2,"submission_content_hash":null,"submission_id":null,"submission_kind":null,"submission_valence":null,"v":1}