Trust Center

Operational security, availability targets, data handling practices, and procurement documentation for enterprise evaluation.

Last Updated
27 February 2026
Review Cycle
Quarterly
Security Contact
security@feedoracle.io
Enterprise Contact
enterprise@feedoracle.io

Trust at a Glance

Data ResidencyEU (Germany)
Encryption in TransitTLS 1.2+ (Cloudflare-managed)
Encryption at RestLUKS disk encryption + restricted file permissions
AuthenticationAPI keys (rotation + revocation)
SSO / 2FARoadmap Q3 2026 · Interim: enforced key rotation + IP allowlist
Log Retention90 days (access) / 30 days (application)
BackupsDaily · RPO ≤ 24h · RTO ≤ 4h
AI TrainingNo customer data used for AI model training
CertificationsSOC 2 Type II target Q4 2026 · ISO 27001 design reference
SLAEnterprise SLA addendum available (availability, support, remedies)

Contents

1. Security Overview

FeedOracle is a data infrastructure platform. We aggregate, normalize, and sign public data from blockchain networks, central banks, and climate organizations. The security posture reflects this scope: we do not hold customer funds, process payments on behalf of users, or store sensitive personal data beyond API credentials.

Security Principles

Transport Security

LayerImplementation
TLS1.2 and 1.3, managed via Cloudflare
HSTSEnabled with max-age=31536000; includeSubDomains
CertificateEdge: Cloudflare-issued · Origin: Let's Encrypt · both auto-renewed
DDoS ProtectionCloudflare WAF + rate limiting

Server Security

ControlImplementation
SSH AccessKey-based only, password authentication disabled
FirewallUFW with deny-by-default, explicit port allowlisting
Intrusion Preventionfail2ban with aggressive ban thresholds
OS UpdatesUnattended security updates enabled
Service IsolationDedicated systemd services with restricted permissions

2. Key Management & Signatures

FeedOracle uses ECDSA (secp256k1) signatures to provide cryptographic proof of data delivery. This is the same curve used by Bitcoin and Ethereum, enabling independent verification by any client.

Signing Architecture

ComponentDetails
AlgorithmECDSA with secp256k1 curve (ES256K)
Key FormatPEM-encoded, file-system stored with restricted permissions (0600)
Signing ScopeAPI response body (JSON payload + timestamp + endpoint path)
VerificationJWKS (canonical): /.well-known/jwks.json · Alias: /jwks · PEM export: /.well-known/feedoracle-signing.pub

Key Lifecycle

EventPolicy
Key generationGenerated on-server using OpenSSL, never transmitted
Key rotationAnnual rotation target. Old keys remain valid for verification of historical signatures for 12 months after rotation.
Key compromiseTarget: immediate revocation and re-signing of active evidence packs. Target: notification to enterprise customers within 24 hours.
Key storageFile-system with LUKS disk encryption, restricted to signing service user (0600). Not stored in databases or version control. KMS/HSM integration planned for Enterprise tier; current controls: dedicated service user, no DB storage, enforced rotation policy, documented compromise playbook.

On-Chain Anchoring

Evidence hashes are anchored to public blockchains for tamper-proof timestamping:

ChainPurposeFrequencyStatusVerifiable At
XRPLPrimary anchor (memo field)Per-reportActiveXRPScan
Gnosis ChainOlas Mech AI agent deliveryPer-requestActiveGnosisScan
PolygonChainlink Functions oracleOn-demandPreparedSubscription ID 185

3. Access Controls

API Authentication

MethodDetails
AuthenticationAPI key via X-API-Key header or api_key query parameter
Key format64-character hex string, unique per account
Key provisioningAutomated via dashboard registration
Key revocationImmediate via dashboard or support request
Rate limitingPer-key, tiered by subscription plan

Tiered Access

TierRate LimitEndpoints
Free100 req/dayCore carbon + RWA (read-only)
Developer5,000 req/dayAll public endpoints
Professional25,000 req/dayAll endpoints + Evidence Packs
EnterpriseCustomAll endpoints + S3 exports + priority

MCP Server Access

FeedOracle exposes all compliance tools via the Model Context Protocol (MCP), enabling AI agents (Claude Desktop, Cursor, custom clients) to call FeedOracle tools natively with server-attested integrity (HMAC-SHA256). Independently verifiable ES256K signatures are available on the REST API.

PropertyDetails
TransportSSE + Streamable HTTP
Endpointhttps://feedoracle.io/mcp/sse
Tools available18 compliance tools (all tiers)
AuthenticationAPI key via tool parameters
Response signingHMAC-SHA256 provenance on all tool responses

Administrative Access

ScopeControl
Server accessSSH key-only, restricted to operations team
Database accessLocal socket only, no remote connections
DeploymentManual review required, no automated deployments to production
Third-party accessNo third-party administrative access to production systems

Authentication Roadmap

CapabilityStatusTimeline
API key rotation & revocationAvailableNow
IP allowlist (Enterprise)Available on requestNow
2FA for dashboardPlannedQ3 2026
SSO / SAML (Enterprise)PlannedQ4 2026
Interim controls: Enterprise accounts can request enforced key rotation schedules and IP-based access restrictions. Contact enterprise@feedoracle.io for configuration.

4. Availability & SLOs

Live status: uptime.feedoracle.io — public monitoring dashboard with historical uptime data.

Service Level Objectives

MetricTargetMeasurement
API Availability99.5% monthlyUptime monitor (1-min intervals)
Response Time (p95)< 500msUptime monitor
Data Freshness (on-chain)≤ 15 minutesPer-endpoint internal metric
Data Freshness (scores)≤ 24 hoursDaily recalculation
On-Chain Anchoring≤ 24 hoursVerifiable on-chain
Note: These are operational targets (SLOs), not contractual guarantees. Enterprise SLA addendum available with contractual availability commitments, support response times, and defined remedies. Contact enterprise@feedoracle.io to request a draft SLA.

Incident Response

SeverityDefinitionResponse TargetUpdate Frequency
P1 — CriticalComplete API outage30 minutesEvery 30 min
P2 — MajorDegraded performance or partial outage2 hoursEvery 2 hours
P3 — MinorNon-critical issue, single endpoint24 hoursDaily
P4 — InformationalCosmetic or documentation issueBest effortOn resolution

Maintenance Policy

Planned maintenance is performed during low-traffic windows (typically 02:00–05:00 CET) and announced at least 48 hours in advance via the status page. Enterprise customers receive email notification.

5. Logging & Monitoring

SystemWhat Is LoggedRetention
API access logsEndpoint, timestamp, response code, API key hash, latency90 days
Application logsService events, errors, data refresh cycles30 days
Security logsSSH access, failed auth attempts, firewall events90 days
Anchor logsOn-chain transaction hashes, Merkle rootsPermanent (on-chain)

Alerting

Alert TypeChannelResponse
Service downTelegram + uptime monitorTarget: immediate investigation
High error rateTelegram alertsWithin 15 minutes
Stablecoin deviation (RLUSD)Circuit breaker + TelegramAutomatic + manual review
Failed anchorTelegram alertsNext business day
Disk/resource thresholdHealth check systemHourly automated checks
What is NOT logged: Request bodies, full API keys (only hashed), IP addresses in application logs (only in nginx access logs with standard retention).

6. Data Handling & Retention

Data Categories

CategoryExamplesStorageRetention
Public blockchain dataTVL, transactions, holder countsSQLite + ClickHouseIndefinite
Public economic dataFRED rates, ECB data, World BankSQLiteIndefinite
Derived scoresRisk scores, CCI scoresSQLiteIndefinite (versioned)
Evidence artifactsSigned evidence packs, Merkle proofsFile system + on-chainIndefinite
API credentialsAPI keys, email addressesJSON/SQLite (encrypted at rest)Until account deletion
Access logsRequest metadataLog files90 days

Customer Data Inventory

What we store about you:
Account emailRegistration and billing notifications
API key (hashed)Authentication — plaintext never logged after issuance
Subscription tierRate limit enforcement
Access logsEndpoint, timestamp, status code, key hash, latency — 90 days
Billing dataProcessed externally by Stripe — we do not store payment card data

Data Not Collected

Backup Policy

ComponentFrequencyMethodRetention
Website & configurationDaily (03:00 CET)Compressed archive7 days rolling
RWA data & modelsDailyCompressed archive7 days rolling
Carbon monitoring dataDailyCompressed archive7 days rolling
Off-site syncDailyrsync to EU backup server7 days rolling
RPO/RTO targets: Recovery Point Objective: ≤ 24 hours. Recovery Time Objective: ≤ 4 hours for critical services.

7. Infrastructure & Data Residency

ComponentLocationPurpose
Primary API serversGermany (netcup GmbH)API processing, databases, signing
Gateway serverGermany (netcup GmbH)Orchestration, monitoring, off-site backup
CDN / DDoSCloudflare (EU primary, global edge)TLS termination, caching, protection
On-chain anchorsXRPL (active), Gnosis (active), Polygon (prepared)Tamper-proof timestamping

Data Residency Statement

All customer data and derived data products are stored exclusively on EU-based infrastructure (Germany). Cloudflare may route requests through non-EU edge nodes for performance, but does not persistently store API response data. On-chain anchors contain only cryptographic hashes (SHA-256) and contain no personally identifiable or commercially sensitive information.

8a. Subprocessors (Data Processing)

The following third-party service providers process data on behalf of FeedOracle in the GDPR sense:

ProviderPurposeData ProcessedRegion
netcup GmbHInfrastructure hostingAll application dataGermany (EU)
Cloudflare, Inc.CDN, DDoS protection, TLS terminationHTTP requests (transit only)Global (EU primary)
ISRG (Let's Encrypt)TLS certificatesDomain names (automated issuance)US (automated)
AI & Data Use Statement

Subprocessor changes are documented in the changelog below. Enterprise customers can subscribe to change notifications via enterprise@feedoracle.io.

8b. External Data Sources

FeedOracle aggregates publicly available data from the following third-party sources. These are not subprocessors; no customer data is transmitted to them. FeedOracle consumes their published APIs or datasets.

SourceData CategoryIntegration
DeFiLlamaProtocol TVL, RWA category dataPublic API
Federal Reserve FREDT-Bill rates, CPI, economic indicatorsPublic API
ECB (European Central Bank)Euro area rates, monetary policy dataPublic API
World BankCountry-level economic indicatorsPublic API
Ankr Multi-Chain RPCOn-chain data across 50+ networksPublic API
GeckoTerminalDEX liquidity, trading pairsPublic API
CCRIBlockchain energy and carbon ratingsPublic API
EMBER ClimateGlobal electricity and emissions dataPublic API
VeChain ToolChainDNV-certified carbon lifecycle dataPublic API
ClimatiqEmission factorsCommercial API
EU ETSCarbon allowance pricingPublic data
ENTSO-EEU electricity generation mix (8 countries)Public API
UK National Grid ESOUK grid carbon intensityPublic API
ESMA RegisterMiCA token authorization statusPublic register
EBA RegisterSignificant issuer classificationsPublic register
CoinGeckoToken pricing, market dataPublic API

Full source documentation including update frequencies and methodology: Methodology & Sources.

8c. Anchoring Networks (Public Chains)

Evidence hashes are anchored to public, permissionless blockchains for tamper-proof timestamping. Only cryptographic hashes (SHA-256) are written on-chain. No customer data, PII, or commercially sensitive information is published.

NetworkPurposeData WrittenStatusVerifiable At
XRPLPrimary anchor (per-report)SHA-256 hashes in memo fieldActiveXRPScan
Gnosis ChainOlas Mech AI agent (Service 2670)Tool delivery hashesActiveGnosisScan
PolygonChainlink Functions oracleVerified API responsesPreparedSubscription ID 185

Public blockchains are decentralized networks, not service providers. FeedOracle has no contractual relationship with or control over these networks.

9. Vulnerability Disclosure

Reporting a Vulnerability

If you discover a security vulnerability in FeedOracle's systems, we ask that you report it responsibly.

FieldDetails
Contactsecurity@feedoracle.io
EncryptionPGP key available on request
AcknowledgmentWithin 48 hours of receipt
Initial assessmentWithin 5 business days
Resolution targetCritical: 72 hours. High: 14 days. Medium/Low: 30 days.

Scope

In scope: feedoracle.io, api.feedoracle.io, analytics.feedoracle.io, and all API endpoints documented at /docs.html.

Out of scope: Third-party services (DeFiLlama, FRED, Ankr, etc.), social engineering attacks, denial of service testing.

Safe Harbor

We will not pursue legal action against researchers who report vulnerabilities in good faith, follow this disclosure process, and avoid accessing or modifying customer data.

10. Compliance Framework Mapping

FeedOracle maps operational practices to recognized frameworks. These mappings support vendor due diligence but are not certifications.

FrameworkStatusDocumentation
ISO 27001:2022Design ReferenceSecurity Controls
ISO/TC 307Design ReferenceStandards Alignment
DORA (EU)Evidence ProviderDORA Evidence Pack (9p)
ISO 20022ImplementedPayment Validation
ISO 24165 (DTI)Design ReferenceToken classification alignment
ISO 14064Design ReferenceGHG Quantification (Scope 2/3)
ISO 14040Design ReferenceCarbon Life Cycle Assessment methodology
SOC 2 Type IITarget Q4 2026Planned
MiCA (EU)Data ProviderMiCA Evidence Pack (14p)
CSRD / ESRS E1Data ProviderCSRD Climate Report (7p)
Honest note: FeedOracle is not yet ISO 27001 certified or SOC 2 attested. We have designed controls with reference to these frameworks and document our alignment transparently. If your procurement process requires formal certification, please contact us to discuss our roadmap and interim evidence packages.

11. Enterprise Procurement Pack

Pre-packaged documentation for vendor due diligence and procurement workflows:

DocumentContentsFormat
Security ControlsISO 27001 Annex A mappingHTML / MD
Self-DeclarationSecurity posture summaryMD
DORA Support PackThird-party risk review evidencePDF
Data Residency StatementEU hosting, subprocessorsThis page (Section 7)
SLO DocumentationAvailability targets, incident processThis page (Section 4)
Methodology & SourcesClaim documentation, data sourcesHTML
OpenAPI SpecificationComplete API schemaYAML / JSON

Need a custom evidence package for your procurement process?

We work with your vendor risk team to provide the specific documentation you need.

enterprise@feedoracle.io

12. Changelog

DateChangeSection
27 Feb 2026Trust at a Glance summary added; Customer Data Inventory added; AI & Data Use Statement added; encryption at rest details specified; authentication roadmap (2FA/SSO) added; SLA addendum language strengthened; KMS/HSM roadmap noted; MCP signing clarified (HMAC-SHA256 server attestation vs ES256K on REST API); tier names synchronized (Developer/Professional) across all pages; MiCA article count corrected; OpenAPI version corrected to 3.11, 2, 3, 4, 6, 8a
26 Feb 2026Tier names corrected (Developer/Professional); anchoring networks updated (Gnosis Olas Mech active, Polygon Chainlink prepared); CSRD/ESRS E1 framework added; 5 external data sources added; MCP Server section added; DORA & MiCA report links updated2, 3, 8b, 8c, 10
9 Feb 2026Section 8 split into Subprocessors / External Data Sources / Anchoring Networks; absolute-language softened to targets; trust center restructured8, 2, 5
28 Jan 2026Initial Trust & Evidence page published

Material changes to security controls, subprocessors, or data handling practices are documented here. Enterprise customers can subscribe to change notifications.