Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Trust Graph

A trust graph is a data structure, often visualized as a network, that maps trust relationships, endorsements, or social connections between entities in a decentralized system.
Chainscore © 2026
definition
BLOCKCHAIN DATA STRUCTURE

What is a Trust Graph?

A trust graph is a data model that maps and quantifies relationships of trust, reputation, or attestation between entities in a decentralized network.

A trust graph is a mathematical representation, typically visualized as a network of nodes and edges, where nodes represent entities (like users, wallets, or validators) and edges represent attestations or trust relationships between them. Each edge can be weighted to indicate the strength or type of trust, such as a credit score, a social connection, or a staking bond. This structure moves beyond simple binary whitelists/blacklists, enabling nuanced, web-of-trust models for decentralized identity, Sybil resistance, and undercollateralized lending. In blockchain contexts, it transforms subjective social capital into an objective, analyzable graph.

The primary function of a trust graph is to mitigate Sybil attacks, where a single adversary creates many fake identities to gain disproportionate influence. By requiring new participants to obtain attestations from already-trusted nodes within the graph, the system creates a cost to entry that is social or reputational, not just financial. Protocols like BrightID and Gitcoin Passport use this principle for unique-human verification. Furthermore, in decentralized finance (DeFi), projects like Maple Finance and TrueFi utilize trust graphs to underwrite loans, where a borrower's reputation within a network of institutional lenders determines their credit limit.

Constructing a trust graph involves on-chain and off-chain data. On-chain data includes transaction history, token holdings, and governance participation. Off-chain data incorporates social media verifications, domain credentials, and KYC attestations. Oracles and zero-knowledge proofs can be used to import and verify this off-chain data without compromising privacy. The graph is continuously updated, with edges decaying over time without reaffirmation, ensuring the reputation model remains dynamic and current. This creates a living system where a participant's trust score is not static but reflects their ongoing behavior and network standing.

From a technical perspective, analyzing a trust graph involves graph theory algorithms. Key metrics include centrality (identifying the most influential nodes), clustering coefficients (measuring how nodes tend to form groups), and pathfinding (determining the shortest or strongest trust path between two entities). These analyses help in calculating aggregate trust scores, identifying collusion rings, and assessing systemic risk. For developers, libraries for graph databases (e.g., Neo4j) or specialized protocols (e.g., Ceramic Network for decentralized data streams) are essential tools for building and querying these complex structures at scale.

The future evolution of trust graphs points toward interoperable and portable reputation. A user's trust graph accrued in one application (e.g., a lending protocol) could be verifiably presented to another (e.g., a governance platform), creating a cross-protocol identity layer. This is closely related to the concept of Decentralized Identifiers (DIDs) and Verifiable Credentials. Challenges remain, including privacy-preserving computation, standardization of attestation formats, and preventing the emergence of centralized trust authorities, which would contradict the decentralized ethos the technology aims to serve.

how-it-works
MECHANISM

How a Trust Graph Works

A trust graph is a decentralized reputation system that maps relationships and attestations between entities, enabling verifiable identity and creditworthiness without centralized authorities.

A trust graph is a data structure, typically visualized as a network, where nodes represent entities (e.g., individuals, wallets, organizations) and edges represent trust relationships or attestations between them. These edges are cryptographically signed statements, such as "Alice attests that Bob is a reliable borrower" or "DAO X endorses Developer Y." Unlike a traditional centralized credit score, a trust graph is permissionless and composable, allowing anyone to issue, verify, and build upon attestations. The foundational principle is that trust is not derived from a single source but is emergent from the aggregate of connections within the network.

The mechanics of a trust graph rely on decentralized identifiers (DIDs) and verifiable credentials. When an entity makes an attestation, it creates a signed piece of data linked to the recipient's DID. This attestation is then published to a public ledger or decentralized storage system, making it tamper-proof and publicly verifiable. Protocols like Ethereum Attestation Service (EAS) or Ceramic Network provide the infrastructure for creating and managing these graphs. The graph's power comes from graph traversal algorithms, which can calculate a node's reputation score by analyzing the strength, recency, and interconnectedness of its inbound attestations.

Key applications of trust graphs are found in decentralized finance (DeFi) and identity systems. In DeFi, they enable under-collateralized lending by allowing protocols to assess a borrower's creditworthiness based on their on-chain history and social attestations, moving beyond pure over-collateralization. For identity, projects like Gitcoin Passport and BrightID build graphs to prove unique humanity or contributor reputation without exposing personal data. The graph model effectively counters Sybil attacks by making fake identity creation economically or socially costly, as building a web of trustworthy connections is difficult to forge.

Analyzing a trust graph involves evaluating graph metrics such as centrality, clustering coefficient, and path strength. A node with high betweenness centrality acts as a crucial connector, while a dense cluster indicates a tightly-knit, high-trust community. Edge weight can be assigned based on the attestation's value or the attester's own reputation, creating a web-of-trust model. This allows for sophisticated scoring; for instance, an attestation from a highly reputable node carries more weight than one from a new, unconnected entity, creating a system where trust begets trust.

The future evolution of trust graphs points toward interoperability and context-specific subgraphs. A user's reputation for financial dealings, governance participation, and software development could exist as separate but linkable subgraphs within a larger metagraph. Standardization efforts like W3C Verifiable Credentials are crucial for this cross-protocol compatibility. Ultimately, trust graphs aim to digitize and democratize the fundamental human process of building reputation, creating a foundational layer for a more open and efficient decentralized society (DeSoc).

key-features
ARCHITECTURE

Key Features of Trust Graphs

Trust graphs are decentralized reputation systems that map and quantify relationships and behaviors on-chain. Their core features enable new paradigms for undercollateralized lending, identity, and governance.

01

Decentralized Identity & Reputation

A trust graph constructs a portable, user-controlled identity based on verifiable on-chain history. This soulbound reputation is built from actions like consistent loan repayment, governance participation, and protocol contributions. Unlike centralized credit scores, it is transparent, composable, and cannot be arbitrarily revoked.

02

Undercollateralized Lending

This is the primary financial primitive enabled by trust graphs. By assessing a borrower's creditworthiness via their on-chain reputation, protocols can issue loans requiring less than 100% collateral. Key mechanisms include:

  • Credit limits based on trust score.
  • Dynamic interest rates reflecting risk.
  • Default consequences that damage the borrower's graph reputation.
03

Graph-Based Sybil Resistance

Trust graphs inherently combat Sybil attacks by analyzing the quality and depth of connections rather than just the number of identities. Fake accounts lack meaningful transaction history or connections to established, reputable entities (trust anchors). This makes it costly and difficult to game the system at scale.

04

Composability & Programmable Trust

As a public data structure, a trust graph's outputs—scores, attestations, and relationships—are readable by any smart contract. This allows for programmable trust across DeFi and DAOs. A lending protocol can read a score from one graph, while a governance system uses attestations from another, creating a layered trust ecosystem.

05

Transparent & Verifiable Scoring

The algorithms that calculate reputation scores (trust algorithms) are open-source and applied to publicly available on-chain data. Users can audit how their score is derived, and protocols can verify the integrity of the scoring process. This contrasts with opaque, proprietary models used in traditional finance.

examples
TRUST GRAPH

Protocol Examples & Use Cases

A trust graph is a decentralized reputation system that maps relationships and trust scores between participants, enabling secure interactions without centralized authorities. These examples illustrate its application across different blockchain domains.

visual-explainer
DATA STRUCTURE

Visualizing a Trust Graph

A trust graph is a mathematical model representing relationships and confidence levels between entities in a decentralized network. Visualization transforms this abstract data into an interpretable map, revealing the network's structure and security assumptions.

A trust graph visualization is a graphical representation, typically a node-link diagram, where entities (like validators, users, or oracles) are nodes and the attested relationships or trust assumptions between them are edges. The visual properties of these elements—such as node size, color, edge weight, and layout—encode critical metadata. For example, a node's size might represent its stake weight in a Proof-of-Stake system, while the thickness of an edge could indicate the strength or age of a trust link. This transforms raw adjacency matrices or ledger data into an intuitive spatial map.

Effective visualization serves key analytical functions: it identifies central points of failure (highly connected nodes whose compromise would fracture the network), maps consensus clusters (groups of nodes with strong mutual trust), and reveals Sybil attack vectors (clusters of low-stake nodes controlled by a single entity). In blockchain contexts, tools visualize the validator set and their attestation patterns, while in decentralized identity systems like Verifiable Credentials, they map the web of issuers, holders, and verifiers. The layout algorithm itself (e.g., force-directed, hierarchical) is chosen to best highlight the specific trust model being analyzed.

Beyond analysis, these visual tools are crucial for protocol design and simulation. Developers can model changes to slashing conditions or reward mechanisms and observe their impact on the graph's evolution toward greater decentralization or resilience. For users and auditors, a trust graph dashboard provides transparency into the real-world security assumptions of a system, moving beyond abstract promises to a verifiable, cryptoeconomic topology. Ultimately, visualizing a trust graph makes the implicit, explicit—allowing stakeholders to see and reason about the trust they are being asked to place in a decentralized network.

COMPARISON

Trust Graph vs. Traditional Credit Score

A structural and functional comparison of decentralized on-chain trust assessment versus centralized off-chain credit scoring.

Feature / MetricTrust GraphTraditional Credit Score

Data Source

On-chain transactions, DeFi interactions, governance participation

Off-chain financial history (loans, credit cards, bills)

Data Ownership & Portability

User-controlled, portable across applications via wallet

Held by centralized bureaus (e.g., Equifax, Experian), not portable

Underlying Architecture

Decentralized graph of verifiable relationships and interactions

Centralized, proprietary scoring model (e.g., FICO)

Transparency & Auditability

Public, verifiable on-chain data; logic can be open-source

Opaque; model and full calculation are not disclosed

Real-time Updates

Global Accessibility

Permissionless; accessible to anyone with an on-chain history

Geographically fragmented; requires established local credit history

Primary Use Case

Collateral-light lending, sybil resistance, decentralized identity

Risk assessment for traditional loans, mortgages, and rentals

Default Handling

Programmable, automated via smart contracts (e.g., liquidation)

Manual collections, legal proceedings, long-term report impact

security-considerations
TRUST GRAPH

Security Considerations & Risks

A Trust Graph is a data structure that maps relationships and reputation scores between participants in a decentralized system, enabling trustless or trust-minimized interactions. Its security depends on the integrity of its underlying data and the mechanisms for scoring and updating trust.

01

Sybil Attack Vulnerability

A primary risk where a single entity creates many fake identities (Sybil nodes) to manipulate the graph. This can be used to:

  • Inflate a participant's reputation score artificially.
  • Form malicious collusion rings to censor or attack honest nodes.
  • Skew decentralized governance or oracle data. Defenses include proof-of-stake bonding, proof-of-personhood, or leveraging established Web2 social graphs.
02

Data Provenance & Oracle Risk

The graph's accuracy is only as reliable as its input data. Risks include:

  • Garbage in, garbage out (GIGO): Corrupted or malicious off-chain data poisons the entire trust model.
  • Oracle manipulation: If trust scores depend on external oracles, compromising those oracles allows an attacker to rewrite the graph.
  • Centralized data sources: Reliance on a single API or entity reintroduces a central point of failure.
03

Collusion & Bribery Attacks

Participants can form coalitions to game the system for profit, undermining the graph's neutrality. This includes:

  • Bribing nodes to give favorable trust ratings or votes.
  • Collusive staking to control governance and change scoring parameters.
  • Whitewashing, where a malicious actor abandons a low-score identity to start fresh. Mitigations involve cryptoeconomic penalties (slashing) and transparency in relationship changes.
04

Dynamic Graph Poisoning

An attack where an initially trustworthy node (sleeper agent) builds a high reputation over time, then acts maliciously, damaging all nodes that trusted it. This can cause:

  • Cascading reputation loss across the network.
  • Erosion of overall system trust, making participants overly cautious.
  • Difficulty in distinguishing between a poisoning attack and legitimate changes in node behavior. Continuous behavior monitoring and forgiving decay algorithms are potential countermeasures.
05

Centralization of Trust

Despite decentralized aims, trust graphs can naturally centralize around a few highly-connected nodes (hubs). This creates risks:

  • Single points of failure: Compromising a major hub impacts a large portion of the network.
  • Oligopoly: A small group of nodes can exert disproportionate control over the system.
  • Barrier to entry: New nodes struggle to gain trust, reinforcing the power of incumbents. Protocols may implement trust limits or randomized sampling to reduce hub dominance.
06

Privacy & Surveillance Risks

Mapping social or transactional relationships creates a rich dataset that poses privacy threats:

  • Network analysis can deanonymize pseudonymous participants.
  • The graph itself becomes a high-value target for data breaches.
  • Negative externalities: A user's trust score can be affected by the actions of their connections, leading to guilt-by-association. Techniques like zero-knowledge proofs or local computation of trust can help mitigate these risks.
TRUST GRAPH

Common Misconceptions

Clarifying frequent misunderstandings about the role and function of trust graphs in decentralized identity and reputation systems.

No, a trust graph is not the same as a social graph. A social graph maps social connections (e.g., friends, followers), which are often symmetrical and based on social affinity. A trust graph maps explicit or implicit assertions of trust, reputation, or verification, which are often directional, weighted, and context-specific. For example, in a decentralized identity system like Verifiable Credentials, a trust graph shows who issued a credential and who attested to its validity, creating a web of attestations rather than friendships.

TRUST GRAPH

Frequently Asked Questions

A trust graph is a decentralized reputation system that maps relationships and attestations between entities on a blockchain. These questions address its core mechanics, applications, and differences from traditional systems.

A trust graph is a decentralized data structure that maps relationships, reputations, and attestations between entities (like wallets, users, or organizations) on a network. Unlike a centralized authority, it allows participants to issue, aggregate, and query verifiable claims about others, creating a web of trust that is transparent, portable, and resistant to single points of failure. It works by recording signed attestations—such as "Wallet A is a verified developer" or "DAO B endorsed Project C"—as on-chain or cryptographically verifiable data. These attestations form edges in the graph, connecting nodes (entities). Applications like decentralized identity (DID), sybil-resistant governance, and under-collateralized lending then analyze these connections to infer reputation scores or establish credibility without relying on traditional intermediaries.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
What is a Trust Graph? | Blockchain Glossary | ChainScore Glossary