The Seed Key system is how DandyLine ensures every memory reaches its intended recipient, whether they have an account today, won't be born for years, or need someone to hold the key on their behalf. This page documents the complete system: recipient states, the Guardian role, posthumous delivery, and the trust architecture that protects sealed content.
A Seed Key is a unique, shareable code tied to a vault. It's how someone who isn't yet on DandyLine — or doesn't exist yet — eventually connects to the memories planted for them. Think of it like a gift card code for a vault: whoever redeems it gets access to the content inside when it blooms.
Seed Keys are generated automatically whenever a vault is created for someone who can't claim it immediately. They can be shared by text, email, copied as a code, or delivered through a link. The key itself doesn't expire unless the planter sets an expiration.
Seed Keys work regardless of what email address the recipient uses to sign up — the key is the proof, not the email match.
Every vault has one or more recipients. Each recipient falls into one of four states:
A single vault can have MULTIPLE recipients in DIFFERENT states simultaneously. Example: Grandma's vault might have Sterling (Held in Trust, guardian is Ashley), Stella (Held in Trust, guardian is Ashley), Uncle Mike (Invited via email), Grandpa (Active), and Future Grandchildren (Open Claim, unlimited).
Individual seeds within the vault can be assigned to specific recipients OR to the whole vault. So Grandma could plant one seed that says "To all of you" (everyone sees it) and another that says "Sterling, this one is just for you" (only Sterling sees it when he claims his Seed Key).
When a gardener creates a vault, the flow asks "Who is this for?" and the interface works like a contact picker:
The invite link is the connection mechanism, not the email address. If Emma receives an invite at her old college email but signs up with her Gmail, the link still works. The Seed Key doesn't care which email she uses.
If an invite email bounces or gets lost, the planter can see the pending status in their Gardener profile and resend to a different email or text instead.
A Guardian is a trusted person who holds a vault's Seed Key on behalf of someone who can't claim it yet. Guardianship is a responsibility, not a setting.
When planting a vault for someone who can't claim it, the planter gets two options:
When someone accepts, they see a clear, plain-language explanation:
"You are being entrusted with a vault that [Planter's name] planted. Your role is to make sure it reaches the right person at the right time. You are not the recipient — you are the keeper. The original planter chose when this blooms and who it's for. Your job is to deliver the Seed Key when the moment comes."
Guardianship is content-blind by default. This is a locked decision. The Guardian manages delivery but never sees the content. They hold the key but can't use it on themselves.
Three levels of trust protection, layered on top of content-blind guardianship:
This is where the Seed Key and Guardian systems become most critical.
Important UX Consideration: When a bloom arrives from someone who has passed away, EVERY touchpoint needs an alternate, softer version:
The system needs to know the planter's status (alive vs. deceased) so it can choose the right experience. This affects: notification templates (HW#41), bloom reveal animation (ux-bloom-reveal.html), and seed pop-up card design.
Seed Keys and Guardianships live under the Gardener icon in the bottom navigation bar (the profile/identity tab). The bottom nav remains: Field | Pressed | Plant | Gardener.
Inside the Gardener tab:
This ensures nothing gets lost in an email inbox from 2031. Every Seed Key, every guardianship, every pending claim is visible in one place.
A vault can have multiple recipients. Some may be born, some not. Some may be active users, some not. The system must handle:
The Seed Key system requires additions to the D1 database schema:
New terms to add to the DandyLine vocabulary:
| DandyLine Term | What It Means | NOT This |
| Seed Key | The unique code that connects a recipient to a vault | Token, access code, claim code |
| Guardian | A trusted person who holds a Seed Key on behalf of someone who can't claim it yet | Admin, executor, manager |
| Held in Trust | A vault's status when the intended recipient can't claim it yet | Pending, unclaimed, locked |
| Claim / Redeem | The act of entering a Seed Key and connecting a vault to your account | Activate, unlock, register |
| Content-Blind | A Guardian who can manage delivery but cannot view sealed content | Read-only, restricted |
Ideas generated during the April 12, 2026 brainstorm session. Each is tracked as a homework item for further development.
After a planter dies and their vault is delivered, the Guardian or recipient could continue planting new seeds into it. Grandma's vault grows over time as her daughter adds context and stories. Creates layered, multi-generational memory objects. No competitor offers anything like this. (HW#56)
Open Claim Seed Keys at events — weddings, graduations, baby showers, corporate retreats. QR codes on place cards, 150 guests scan and plant seeds, vault fills in real time, blooms on anniversary. Revenue opportunity: per-event pricing or bulk Seed Key packs. Partnership channel with event planners, wedding coordinators, retreat organizers. (HW#57)
Organizations that deal in time + memory embed DandyLine into their services. Hospitals giving new parents a Seed Key at birth. Retirement communities offering Legacy Vault setup. Schools giving graduating seniors a Grove Vault. Each partnership = distribution channel + emotional proof point for investors. (HW#58)
The emotional space between planting and blooming is invisible to recipients. Show a "Something is growing for you" indicator — not what's inside, not when. Like a wrapped present under the tree. Drives retention, creates anticipation, makes the bloom moment even more powerful. (HW#59)
Beautiful physical Seed Key cards — like a gift card but for memories. Sold at retail, included in gift boxes, mailed as invitations. "Someone planted something for you. Scan this to claim it." Makes DandyLine tangible. Solves "how do I explain this to my mom." Revenue stream AND marketing channel. (HW#60)
Instead of a single Guardian, allow a trust circle — 2-3 people who collectively manage delivery. No single person bears the full weight. Adds redundancy. Voting mechanic: 2 of 3 agree → action proceeds. Connects to Shamir's Secret Sharing concept. (HW#61)
🌱 Core Growth Engine Insight
The Seed Key system isn't just a feature — it's DandyLine's core growth engine. Every vault for someone not on the platform = organic invitation. Every Open Claim Key at a wedding = 150 potential signups. Every "Held in Trust" vault for an unborn child = a user who joins years later and arrives to something already waiting. "Sign up and immediately receive a message from someone who loved you before you existed." No other app can offer this. (HW#68 · VP-10)
Known challenges that need design solutions. Each is an opportunity in disguise — solving these well becomes a competitive moat.
Someone creates a vault for an ex. The notification could feel creepy or harassing. Recipients need to reject/block BEFORE seeing content. "Accept / Decline / Block sender." Declined vaults return silently. Blocked senders permanently locked out. (HW#62)
Death certs can be forged. The wait period only works if someone reports the death. Consider a "proof of life" annual check-in. Miss 2-3 → system alerts Guardians. Sensitive but critical for Legacy Vaults to deliver on their promise. (HW#63)
Guardian dies or goes inactive before the planter. Trust chain broken. If unreachable for X months → prompt planter to reassign. If planter also gone → "community trust" state where DandyLine becomes temporary content-blind custodian. (HW#64)
Death verification, posthumous delivery, and Guardian rights vary by country. COPPA for minors, GDPR for data after death. Start US-only for posthumous features. The complexity of getting this right is actually a MOAT — competitors won't bother. (HW#65)
Power users managing lots of Seed Keys could see a wall of codes. Design principle: show the PEOPLE, not the codes. "Emma — Invited, waiting to join" beats "SK-7X9K2M — status: invited." Group by vault. The key is backend; the human is what the Gardener sees. (HW#66)
Guardians can't see content, but harmful content could be planted in a vault destined for a child. Solution: DandyLine-level AI moderation at plant time. The content-blind Guardian promise stays intact; DandyLine itself is the safety net. Needs moderation policy, flagging process, and appeal system. (HW#67)
Resolved April 18, 2026. Originally worked through in ux-planting-flow.html (Unknowns section) and moved here as the canonical home. Also tracked as HW#81, HW#82, HW#85.
Who can change a bloom date, recall a seed, or act on a vault when the Planter can't? This section is the authority model for everything a Guardian touches. It's built around one principle: a seed is a gift to the recipient, and once planted, nobody reaches in and rearranges it except under strict rules.
A per-seed or per-vault opt-in flag at planting time that permanently freezes the bloom date. Once sealed with Super Lock ON, the flag is irreversible. No one can ever change the date — not the planter, not the Guardian, not Premium users.
Gardeners can name a Default Guardian in their profile that auto-applies to all new vaults (changeable per vault). At account setup, the user is asked but never required: "You can skip and add later, but we strongly encourage it."
Every Grove has two Guardian layers:
A contributor's Guardian can only manage that contributor's seeds within the Grove — never other contributors'. The Vault Guardian cannot touch individual contributor seeds. Personal ownership is preserved inside a shared container.
Premium tools are: calendar view across all vaults, bulk rescheduling, a "snooze" button for upcoming blooms. Premium users don't get new powers over their non-locked seeds (they already have those) — they get better tools.
Final confirmation shows a full impact summary. This is also a retention mechanism — the considered exit often changes the user's mind mid-flow.
Resolved April 2026. Originally mapped in ux-planting-flow.html Unknowns section. Pairs with HW#89 (Super Lock + Date TBD interaction).
The wedding scenario: a Planter knows the event (wedding day), knows the recipient (her daughter), knows the content (her voice note). But the wedding date hasn't been set yet. The vault is sealed and content is preserved — but no bloom date exists. Date TBD is available to all tiers when the Planter names a Guardian at vault creation.
The vault sits in a "Sealed · Date Pending" state. Content is locked (no edits). The trigger is open. What happens next is the Ladder:
If no bloom date is set after 6 months, the Planter gets a friendly email nudge: "Your wedding vault is waiting — ready to set the date?" Nudges repeat every 6 months for 2 years. Warm, unpressured tone. No guilt.
After 2 years with no date set and no Planter response to nudges, the vault enters Held in Trust status and transfers to the named Guardian. The Guardian is notified and can either set a bloom date or let it continue waiting. This reuses the existing Held in Trust state (see Section 02) — no new infrastructure.
20 years after creation (within the 25-year guarantee window, leaving a 5-year buffer), a final Sunset Notification triggers to Planter AND Guardian. They can extend, auto-bloom to the recipient now, or export/download offline. If no response after multiple notifications, the vault blooms to the Guardian as a final delivery — matching the Sunset flow already resolved for vault duration limits.
Standard authority rules from Section 14 apply. While the Planter is active, only the Planter sets the date. On Grove vaults, co-planters can propose dates; the vault creator approves. Only after Held in Trust kicks in can the Guardian set a date unilaterally.
Resolved April 18, 2026. Originally mapped in ux-planting-flow.html Unknowns section. Also addresses COPPA compliance architecture.
How does DandyLine know when an age-based trigger fires? If a Planter seals a vault to bloom "when she turns 18," the system needs the recipient's birthday — but the Planter shouldn't have to carry that fact around in their head, and for unborn recipients it's unknowable at planting time.
The Event-Anchor Model separates intent (set by the Planter) from fact (sourced from the person the fact belongs to). The Planter declares the trigger; the recipient or their Guardian supplies the data. Three layers make this work:
It does two jobs at once:
Displayed discreetly. Month + day may be visible to Grove members the Gardener has chosen to share with; year is private unless the user opts in.
When a Planter assigns an age-milestone trigger, DandyLine pulls the recipient's birthday from their profile automatically. The UI confirms back in plain language: "Stella turns 18 on March 4, 2044" — as soon as Stella is selected.
If the Planter attaches a recipient who doesn't have an account yet (Seed Key path), the bloom date is calculated later — at claim time, when the recipient or their Guardian enters the birthday.
The planting UI should not over-center birthday. Equally valid triggers: life events (graduation, marriage, first job), custom dates (anniversaries, memorials), calendar dates, and bloom-on-demand. Birthday is just the "age + date math" case. All trigger types live on equal visual footing in the planting flow.