FeedOracle × Avalanche — Compliance & Evidence Infrastructure for Institutional Adoption

March 23, 2026 · Murat Keskin · 5 min read

🏔️ 3 Verified Contracts · 5 MCP Servers · 15 Tools

Deployed on Avalanche C-Chain Mainnet — live now

The Missing Layer

Avalanche has price oracles. It has identity solutions. It has tokenization infrastructure from Securitize and Ondo. What it doesn't have is a compliance and evidence layer — the infrastructure that tells institutions whether they can actually use what's on the chain.

Today, we're changing that with five focused plugins built specifically for Avalanche's institutional and tokenization narrative.

"Chainlink tells you what an asset costs. AvaRisk tells you if a bank can touch it. That's a fundamentally different question — and nobody is answering it on-chain."

Three Smart Contracts — Verified on Mainnet

AvaRisk

Institutional Risk Oracle

Returns PASS/WARN/BLOCK for any token. MiCA compliance score, reserve quality, sanctions screening.

0xc194bfee3d508fb361e90f638611271b222451a0
View on Snowtrace ↗ ✅ Source Verified

AvaEvidence

On-Chain Evidence Anchor

SHA-256 evidence hashes anchored on C-Chain. Batch anchoring via Merkle roots. Independently verifiable.

0x4f1d269286ba8b42960765f4f16b7a172cab0a50
View on Snowtrace ↗ ✅ Source Verified

SubnetGuard

Cross-Subnet Compliance Passport

Compliance passports for Avalanche Subnets. Enables institutional subnets to verify counterparty compliance.

0x16b827f23c104ee98564fdfea1ace533bfcbf251
View on Snowtrace ↗ ✅ Source Verified

Live On-Chain Data

These aren't empty contracts. We've seeded them with real compliance assessments:

✅ PASS USDC — Circle EMI-licensed, MiCA-compliant, institutional-grade
🔴 BLOCK USDT — No EU authorization, blocked for institutional use under MiCA
✅ ANCHORED First evidence hash verified on Avalanche C-Chain

Any smart contract on Avalanche can now call AvaRisk.isCompliant(tokenAddress) and get a verifiable answer.

Five MCP Servers — 15 Tools for AI Agents

Beyond smart contracts, we've deployed five MCP (Model Context Protocol) servers that make compliance data accessible to AI agents and automated systems:

PluginToolsWhat It Does
AvaRisk3Institutional risk assessment — PASS/WARN/BLOCK per token
AvaEvidence3Anchor & verify evidence hashes on Avalanche
SubnetGuard3Cross-subnet compliance passports & interaction checks
AvaRWA3Due diligence for tokenized assets (BUIDL, USDY, OUSG)
AvaAmpel3MiCA/DORA regulatory readiness for Avalanche protocols

All servers are live at feedoracle.io/mcp/{plugin}/ and use FeedOracle's 402 billing protocol.

Why SubnetGuard Changes Everything

Avalanche's institutional strategy is built on Subnets — Spruce, Evergreen, Intain. But here's the gap: when an institutional subnet wants to interact with another subnet, there's no standardized way to verify the counterparty's compliance status.

SubnetGuard solves this. It provides a compliance passport for each assessed subnet — validator decentralization, contract audit status, stablecoin exposure, governance structure, regulatory readiness. All scored, all verifiable on-chain.

"SubnetGuard makes cross-subnet interaction possible for regulated entities. Without it, institutional subnets operate in isolation. With it, Avalanche becomes the first ecosystem where compliance travels with the data."

What This Means for Avalanche

Technical Details

All contracts are written in Solidity 0.8.24, compiled with Foundry (via-IR + optimizer), and verified on Snowtrace. The oracle address can be updated by the contract owner, allowing FeedOracle to push continuous compliance updates on-chain.

Evidence anchoring uses SHA-256 hashes with optional Merkle batch anchoring for cost efficiency. Every hash is independently verifiable — you don't need FeedOracle to confirm the evidence exists.

MCP servers use StreamableHTTP transport with FeedOracle's standard 402 billing protocol and ECDSA evidence signatures.

Try It Now

Call AvaRisk from any Avalanche smart contract, or connect via MCP.

Live Ampel Dashboard →
AvalancheMiCADORASmart ContractsMCP ComplianceEvidenceSubnetsInstitutionalRWA