# Validate AI Agent Trust Chain

> ⚠️ **Before you begin...**
>
> Make sure you have configured the [MCP Client as per the setup instructions](https://docs.cheqd.io/product/getting-started/trust-registry/setup-mcp#getting-started).

To validate your AI Agent, you can simply use the `whois` prompt provided by the Cheqd MCP Server.

<figure><img src="https://3569764573-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPVAMvpKH7PYzvXA6u6Cn%2Fuploads%2FmCl6smCYRuMh93KfY7cn%2FScreenshot%202025-05-01%20at%2016.44.58.png?alt=media&#x26;token=0a720ffa-7ae3-4169-b58c-7857e174ba93" alt=""><figcaption></figcaption></figure>

Then Click "Send" button without writing any other prompt:

<figure><img src="https://3569764573-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPVAMvpKH7PYzvXA6u6Cn%2Fuploads%2F6EaNhlLTMmw9amCxX1CS%2FScreenshot%202025-05-01%20at%2016.46.15.png?alt=media&#x26;token=f627faaa-f84a-4695-867d-fb00ccabf303" alt=""><figcaption></figcaption></figure>

You can also use `/<mcp-server-name>:whois` if using a CLI client:

<figure><img src="https://3569764573-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPVAMvpKH7PYzvXA6u6Cn%2Fuploads%2FdKMTmEas6TmszciPotge%2FScreenshot%202025-05-01%20at%2016.49.56.png?alt=media&#x26;token=f9382a4b-3977-44a4-a758-da1083757e00" alt=""><figcaption></figcaption></figure>

The response should be similar to below. Claude/Client should use `list-credentials` to get the latest credentials from Agent's wallet, and then use `verify-trust-registry` tool to verify the credential.

<figure><img src="https://3569764573-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPVAMvpKH7PYzvXA6u6Cn%2Fuploads%2Fb292Q64nwlDuceoKGlzv%2FScreenshot%202025-05-01%20at%2016.53.34.png?alt=media&#x26;token=73aa7fde-f29a-479a-871b-613e84d46e5e" alt=""><figcaption></figcaption></figure>

Then present a summary of the credential:

<figure><img src="https://3569764573-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPVAMvpKH7PYzvXA6u6Cn%2Fuploads%2Fgq79ulZwQYF0tl5AydoT%2Fimage.png?alt=media&#x26;token=2e619a22-8dc8-4289-81ce-a7c8dd01d1f6" alt=""><figcaption></figcaption></figure>

## Learn more about what's happening under the hood:

Under the hood, the MCP Server is using our trust registry validation engine called TRAIN to recursively verify the issuer of the credential, up to a root of trust.&#x20;

{% hint style="success" %}
If you do not want to use MCP, you can build and validate cheqd Trust Registries in any alternative application using our more generalised tutorials.
{% endhint %}

Read more about our Decentralized Trust Chain (DTC) approach and how TRAIN works below:

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td><mark style="color:blue;"><strong>Decentralized Trust Chains (DTCs)</strong></mark></td><td>Build using our Trust Registry solution using DIDs and DID-Linked Resources based on the EBSI Trust Chain model.</td><td></td><td><a href="https://3569764573-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPVAMvpKH7PYzvXA6u6Cn%2Fuploads%2Fgit-blob-7f1ffe5c0546f0ee4f106ac1a71308c5ee5ad7c8%2Fcheqd_logo_card.jpg?alt=media">cheqd_logo_card.jpg</a></td><td><a href="../../studio/trust-registries/dtc">dtc</a></td></tr><tr><td><mark style="color:blue;"><strong>Get Started With TRAIN</strong></mark></td><td>Deploy TRAIN and start validating trust chains with DNS-anchored roots and cryptographic accreditations.</td><td></td><td><a href="https://3569764573-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPVAMvpKH7PYzvXA6u6Cn%2Fuploads%2Fgit-blob-e721026059ae81bd3527e531a6013e5e74bdb42e%2Ffraunhofer.png?alt=media">fraunhofer.png</a></td><td><a href="../../studio/trust-registries/train">train</a></td></tr></tbody></table>
