Connect Your AI Agent to
Evidence-Grade Compliance Data

3 MCP servers · 48 tools · OAuth 2.0 + PKCE · Connect in minutes

On this page

  1. What is FeedOracle MCP?
  2. Why connect?
  3. Developer & Enterprise paths
  4. Quick Start (4 steps)
  5. Plans & Pricing
  6. Enterprise: Trust & Governance
  7. Scopes & tool access
  8. OAuth reference
  9. Code examples

What is FeedOracle MCP?

FeedOracle provides 3 MCP servers with 48 tools that give AI agents access to evidence-grade financial and regulatory data:

ServerWhat it doesTools
ComplianceMiCA authorization, reserve quality, peg monitoring, evidence packs across 18 EU regulatory articles for 105+ stablecoins22
Risk7-signal operational risk: peg stability, custody, redemption, supply flow, holder concentration, cross-chain, liquidity13
MacroFed Watch, yield curve, recession probability, inflation, DeFi rates, consumer sentiment — 86 FRED series13

Every response is cryptographically signed and timestamped. Transport integrity via HMAC-SHA256. Premium tiers get ECDSA ES256K evidence signatures and blockchain-anchored PDF reports.

Why connect?

If you're building AI agents that touch regulated financial markets, you need data that auditors accept — not just data that works.

Evidence-grade, not just data. Every data point has a provenance chain: source, timestamp, hash, signature. Your agent gets a verifiable claim with a cryptographic proof trail.

MiCA-first. The July 2026 MiCA enforcement deadline affects every EU-facing stablecoin and CASP. FeedOracle covers 18 MiCA articles across 105+ tokens. No other oracle does this.

Built for machines. MCP means your AI agent can query regulatory status, risk scores, and macro signals autonomously — and explain its reasoning with full citations.

Already connecting without auth? Your agent gets 20 calls/day as anonymous. Register a client to get 5x more (free), or unlock all 48 tools with a paid plan.

Developer & Enterprise Paths

I'm a Developer

Connect an AI agent or MCP client and start making tool calls.

  • OAuth 2.0 + PKCE flow
  • 4-step Quick Start with curl
  • Python, Claude Desktop, PowerShell
  • Scope-to-tool mapping
Quick Start →
🏢

I'm an Enterprise Decision-Maker

Evaluate trust, governance, and compliance fit.

  • Pricing & tier comparison
  • Data provenance & audit trail
  • SLA, support, DORA/MiCA alignment
  • Data residency (Germany)
Plans & Pricing →

Quick Start: 4 Steps to Your First MCP Call

No account, no login, no dashboard required. Just 4 HTTP requests.

Register — get client_id + client_secret instantly
curl -X POST https://feedoracle.io/mcp/register \
  -H "Content-Type: application/json" \
  -d '{
    "redirect_uris": ["http://localhost:3000/callback"],
    "client_name": "My AI Agent",
    "grant_types": ["authorization_code", "refresh_token"]
  }'
# -> { "client_id": "abc-123", "client_secret": "fo_secret_...", ... }
Authorize — PKCE code challenge
# verifier = random 43 bytes, challenge = SHA256(verifier) base64url
curl -G "https://feedoracle.io/mcp/authorize" \
  --data-urlencode "response_type=code" \
  --data-urlencode "client_id=abc-123" \
  --data-urlencode "redirect_uri=http://localhost:3000/callback" \
  --data-urlencode "code_challenge=YOUR_CHALLENGE" \
  --data-urlencode "code_challenge_method=S256" \
  --data-urlencode "scope=mcp:read"
# -> 302 redirect with ?code=fo_code_...
Token — exchange code for access + refresh token
curl -X POST https://feedoracle.io/mcp/token \
  -d "grant_type=authorization_code" \
  -d "code=fo_code_..." \
  -d "client_id=abc-123" \
  -d "client_secret=fo_secret_..." \
  -d "redirect_uri=http://localhost:3000/callback" \
  -d "code_verifier=YOUR_VERIFIER"
# -> { "access_token": "fo_at_...", "expires_in": 3600, "refresh_token": "fo_rt_..." }
Connect — Bearer token on any MCP server
from mcp import ClientSession
from mcp.client.sse import sse_client

async with sse_client(
    "https://feedoracle.io/mcp/sse",
    headers={"Authorization": "Bearer fo_at_..."}
) as (read, write):
    async with ClientSession(read, write) as session:
        await session.initialize()
        result = await session.call_tool("mica_status", {"token_symbol": "USDC"})
Claude Desktop / mcp-remote? OAuth is handled automatically. Just add the SSE URL — your client discovers registration, tokens, and scopes on its own.

Plans & Pricing

Every OAuth client starts on Free. Upgrade when you need more calls, deeper tools, or signed reports.

Free
$0
Testing, discovery, proof-of-concept
  • 100 calls/day, 10 req/min
  • 22 compliance tools
  • mcp:read
  • No risk or macro tools
  • No PDF reports
Register free →
Pro
$49 /month
Developers, small teams, first production integrations
  • 5,000 calls/day, 60 req/min
  • 48 tools across all 3 servers
  • read risk macro compliance
  • Full MiCA evidence packs
  • PDF reports via add-on
Start Pro →
Agent
$299 /month
Autonomous AI agents, compliance workflows, trading desks
  • 50,000 calls/day, 120 req/min
  • All 48 tools + signed PDF reports
  • All 5 scopes unlocked
  • Blockchain-anchored evidence
  • Priority support
Start Agent →
Enterprise
Custom
Banks, asset managers, regulated institutions
  • Unlimited calls, 300 req/min
  • All tools + SLA guarantee
  • Custom scopes & endpoints
  • Dedicated support
  • Invoice + USDC payment
Contact Sales →

When should you upgrade?

Free → Pro: When you move to production or need risk/macro data beyond basic compliance. Most teams upgrade when building automated MiCA monitoring.
Pro → Agent: When your agent runs autonomously (scheduled risk sweeps, multi-token monitoring, alert systems) and you need signed PDF evidence for audit trails.
Agent → Enterprise: When your compliance officer asks "who is the counterparty and what's the uptime commitment?"

Payment via Stripe (card) or USDC on Polygon. Tier changes apply instantly — no downtime, no re-registration.

Enterprise: Trust & Governance

ConcernHow FeedOracle addresses it
Data integrityTransport: HMAC-SHA256. Evidence: ECDSA ES256K. Blockchain: XRPL anchoring. Full provenance chain per data point.
Audit trailEvery tool call logged with client ID, timestamp, tool name, response hash. Per-client billing reports. Verifiable PDF report hashes.
MiCA alignment18 of 22 data-trackable articles. ESMA + EBA register cross-validation. Evidence infrastructure, not certification.
DORA relevanceICT risk data: custody concentration, counterparty exposure, operational resilience. Art. 28 third-party risk.
Access controlOAuth 2.0 + PKCE. Scope-based restriction. Per-client rate limits. Token rotation. Revocation endpoint.
Data residencyServers in Germany (Netcup GmbH, Germany). No US cloud dependency for core infrastructure.
AvailabilityReal-time monitoring: uptime.feedoracle.io (33 monitors). Enterprise SLA available.
Need a deeper evaluation? Architecture docs, live demo with your data, direct founder access. Email enterprise@feedoracle.io.

Scopes & Tool Access

Scopes control which tools your client can call. Granted based on your tier.

ScopeServerToolsWhat you getMin. Tier
mcp:readCompliance22MiCA status, peg monitoring, custody risk, evidence profiles, leaderboardsFree
mcp:risk:readRisk137-signal risk scoring, batch assessment, portfolio analysis, alertsPro
mcp:macro:readMacro13Fed Watch, yield curve, recession risk, inflation, DeFi rates, macro regimePro
mcp:compliance:readCompliance4Full MiCA evidence packs, multi-framework bundles, AI provenancePro
mcp:verified-reports:readCompliance1Signed, blockchain-anchored PDF compliance reportsAgent

OAuth Reference

Discovery

GET/.well-known/oauth-protected-resource

RFC 9728 — points to Authorization Server

GET/.well-known/oauth-authorization-server

RFC 8414 — all endpoints, scopes, grant types

GET/.well-known/mcp/server.json

MCP Server Manifest v2.4.0

Auth Endpoints

EndpointMethodPurpose
/mcp/registerPOSTDynamic Client Registration (RFC 7591)
/mcp/authorizeGETAuthorization — redirect with code
/mcp/tokenPOSTToken exchange & refresh
/mcp/revokePOSTToken revocation

Token Lifecycle

TokenPrefixLifetimeRotation
Access Tokenfo_at_1 hourNew on refresh
Refresh Tokenfo_rt_30 daysRotated on use
Auth Codefo_code_5 minSingle use

Auth Methods

MethodHowTierBest For
OAuth BearerAuthorization: Bearer fo_at_...Per clientMCP clients, AI agents
API Keyapi_key in tool argsPer keyREST API, scripts
AnonymousNo header20/dayTesting, discovery

Priority: Bearer > API Key > Anonymous. All three methods coexist. Existing integrations continue to work.

Code Examples

Python — Full Flow

import hashlib, base64, secrets, requests, asyncio, json
from mcp import ClientSession
from mcp.client.sse import sse_client

BASE = "https://feedoracle.io/mcp"

# 1. Register (one-time)
reg = requests.post(f"{BASE}/register", json={
    "redirect_uris": ["http://localhost:3000/cb"],
    "client_name": "My Trading Agent",
    "grant_types": ["authorization_code", "refresh_token"],
}).json()
CID, CS = reg["client_id"], reg["client_secret"]

# 2. PKCE
verifier = secrets.token_urlsafe(43)
challenge = base64.urlsafe_b64encode(
    hashlib.sha256(verifier.encode()).digest()
).rstrip(b"=").decode()

# 3. Authorize
r = requests.get(f"{BASE}/authorize", params={
    "response_type": "code", "client_id": CID,
    "redirect_uri": "http://localhost:3000/cb",
    "code_challenge": challenge, "code_challenge_method": "S256",
    "scope": "mcp:read",
}, allow_redirects=False)
code = r.headers["location"].split("code=")[1].split("&")[0]

# 4. Token
tokens = requests.post(f"{BASE}/token", data={
    "grant_type": "authorization_code", "code": code,
    "client_id": CID, "client_secret": CS,
    "redirect_uri": "http://localhost:3000/cb",
    "code_verifier": verifier,
}).json()

# 5. Query
async def query():
    hdrs = {"Authorization": f"Bearer {tokens['access_token']}"}
    async with sse_client(f"{BASE}/sse", headers=hdrs) as (r, w):
        async with ClientSession(r, w) as s:
            await s.initialize()
            return await s.call_tool("mica_status", {"token_symbol": "USDC"})

print(asyncio.run(query()))

Claude Desktop

{
  "mcpServers": {
    "feedoracle-compliance": {
      "command": "npx",
      "args": ["-y", "mcp-remote", "https://feedoracle.io/mcp/sse"]
    },
    "feedoracle-macro": {
      "command": "npx",
      "args": ["-y", "mcp-remote", "https://feedoracle.io/mcp/macro/sse"]
    },
    "feedoracle-risk": {
      "command": "npx",
      "args": ["-y", "mcp-remote", "https://feedoracle.io/mcp/risk/sse"]
    }
  }
}

Ready to connect?

Start with Free (100 calls/day) or go straight to Pro for the full stack.

Register Free → Talk to Sales

← Documentation · MCP Overview · Pricing · Uptime Status