Methodology & Sources

Version 2.0 · Last updated: 30 March 2026 · Review cycle: Quarterly

This document explains how FeedOracle collects data, calculates scores, signs evidence, and attributes sources. All public claims are documented here with methodology and limitations.

Platform Overview

MCP Servers11
MCP Tools206+
Data Sources17
Regulations CoveredDORA (EU 2022/2554) · MiCA (EU 2023/1114) · AMLR
Evidence SigningES256K (secp256k1) on every artifact
On-Chain AnchoringXRPL + Polygon
Audit TrailSHA-256 chain-linked, 590+ verified entries

DORA Operating System Methodology

The DORA OS (49 MCP tools, AmpelOracle port 10101) assesses entity readiness across all 26 DORA articles using a traffic-light model.

Scoring Model

Each DORA article is assessed via 1–3 automated checks (39 total checks, 67 controls). Each check returns GREEN (pass), YELLOW (partial), RED (fail), or GREY (not assessed). Article-level status is the worst-case of its checks. Entity readiness score = weighted average: GREEN=100, YELLOW=50, RED=0, GREY=excluded.

Score ≥ 75%HIGH readiness
Score 40–74%MEDIUM readiness
Score < 40%CRITICAL ATTENTION

Closed-Loop Process

Check → Evidence → Finding → Owner Assignment → Remediation → Re-Test → Closure → Signed Report. Findings that exceed SLA trigger 3-level escalation (Owner → CISO → Board). Cross-regulation findings automatically propagate to MiCA and AMLR.

Automation Levels

Full Auto (23)Art. 5–12, 17–21, 24–25, 28–31, 45 — system checks, creates findings, escalates, closes
Semi Auto (1)Art. 26 TLPT — system generates scenarios, human coordinates Red Team
Manual (2)Art. 14, Art. 27 — crisis communication and TLPT tester requirements
Limitation: DORA scores are evidence-infrastructure output, not compliance certification. Contract clause analysis is keyword-based with confidence scores. BaFin incident reports are prepared automatically; submission may require manual portal upload.

MiCA Compliance Methodology

MiCAOracle (24 tools, port 10201) assesses stablecoin compliance against EU 2023/1114. ESMA authorization status is binary — tokens are either authorized (in the ESMA register) or not. Compliance score combines authorization, reserve quality, peg stability, custody, and issuer transparency.

ESMA RegisterLive check against ESMA authorized stablecoin register
Reserve Quality (Art. 38)Composition, custody (SIFI status), liquidity
Peg Stability30-day deviation history, max deviation, current delta
Significant Issuer (Art. 43)Market cap thresholds, cross-border usage, interconnectedness

Verdict: PASS (authorized + score ≥ 70) / WARN (pending or score 40–69) / BLOCK (not authorized or score < 40). 105+ stablecoins monitored.

AMLR Screening Methodology

AMLOracle (12 tools, port 8701) performs sanctions screening against 87,000+ names from EU, OFAC, and UN consolidated lists. PEP checks use publicly available political exposure databases. Adverse media monitoring covers major news sources.

Sanctions ListsEU Consolidated (5,900+), OFAC SDN (12,000+), UN SC (800+), plus country-specific lists
PEP DatabasePolitically Exposed Persons — heads of state, government officials, senior executives
GLEIFLegal Entity Identifier lookup — entity verification and ownership structure

Complete Data Source Register (17 Sources)

Regulatory & Compliance

ESMA MiCA RegisterAuthorized stablecoins, CASPs, non-compliant entities
NVD / CISA KEVCVE vulnerabilities, Known Exploited Vulnerabilities catalog
CERT-BundGerman BSI security advisories
MITRE ATT&CKThreat actor techniques for TIBER-EU testing
EU/OFAC/UN Sanctions87,000+ sanctioned entities and individuals

Macro Economic

FRED (St. Louis Fed)86 series — rates, inflation, GDP, employment, housing
ECB Statistical Data20 series — rates, FX, HICP, M3, bond yields
World Bank Open DataGDP rankings, country profiles, 200+ countries
Bureau of Labor StatisticsUS employment, CPI direct from BLS API
OECD SDMX APIGDP, unemployment, inflation, CLI for 38 countries

Blockchain & DeFi

DeFiLlamaProtocol TVL, yields, stablecoins, DEX volumes
Chain RPCsOn-chain data from 12+ networks (ETH, SOL, TON, Base, etc.)
HaveIBeenPwnedBreach detection for DORA incident intelligence

Research & Academic

Semantic Scholar200M+ academic papers, citation graphs
arXiv + CrossrefPreprints, DOI resolution, metadata

Evidence Signing & Verification

Every evidence artifact produced by FeedOracle is cryptographically signed using ES256K (secp256k1) and content-hashed with SHA-256. Reports are additionally anchored on XRPL and Polygon for independent verification.

Signing AlgorithmES256K (ECDSA on secp256k1)
Content HashSHA-256 of evidence payload
Audit TrailSHA-256 chain-linked log (genesis → current, 590+ entries)
On-Chain AnchorXRPL memo transactions + Polygon attestation contract
Public Keyfeedoracle.io/.well-known/jwks.json

How to Verify

1. Check the ES256K signature against the JWKS public key. 2. Validate the SHA-256 content hash. 3. Confirm the audit chain integrity (each entry links to previous via hash). 4. Verify the on-chain anchor on XRPL or Polygon explorer.

RWA Risk Scoring (9 Vectors)

The RWA Risk Oracle scores tokenized asset protocols across 9 independent risk dimensions. Each produces a normalized score (0–100), weighted and aggregated into a composite.

1. TVL WeightProtocol size relative to category (DeFiLlama)
2. Yield SpreadDeviation from risk-free rate (FRED T-Bill)
3. DiversificationAsset type concentration
4. Maturity ProfileDuration and redemption terms
5. Regulatory AlignmentJurisdiction registration status
6. Institutional BackingKnown institutional participants
7. DEX LiquiditySecondary market depth (GeckoTerminal)
8. On-Chain ActivityTransaction volume, holder count
9. ESG / CarbonNetwork energy and emissions (CCRI/EMBER)
Limitation: Risk scores are data-derived indicators, not ratings or investment recommendations. FeedOracle is not a credit rating agency.

Data Freshness & Update Policy

DORA AssessmentsDaily automated pipeline (04:00–07:00 UTC)
MiCA Stablecoin MonitoringContinuous (peg every 15 min, ESMA daily)
Sanctions ListsDaily update from EU/OFAC/UN sources
Macro Economic (FRED/ECB)Daily API pull
OECD DataDaily prefetch at 04:00 UTC, SQLite cache
CVE/KEV/CERT-BundHourly monitoring
Evidence FreshnessStatus: current / stale / superseded (lifecycle managed)

Methodology Change Log

30 Mar 2026v2.0 — Added DORA OS methodology (49 tools, closed-loop, scoring model), MiCA compliance methodology, AMLR screening, evidence signing, 17 data sources. Updated platform overview to 206+ tools / 11 servers.
9 Feb 2026v1.0 — Initial methodology documentation (RWA risk scoring, TVL calculation, jurisdiction coverage, DNV attribution)

Questions about our methodology?

We welcome scrutiny. Every claim is documented and verifiable.

enterprise@feedoracle.io · DORA OS · Dashboard · Whitepaper

FeedOracle Technologies · Bad Salzuflen, Germany · feedoracle.io · Not financial advice, compliance certification, or investment recommendation.