Trust Center

Operational security, availability targets, data handling practices, and procurement documentation for enterprise evaluation.

Last Updated
14 February 2026
Review Cycle
Quarterly
Security Contact
security@feedoracle.io
Enterprise Contact
enterprise@feedoracle.io

Contents

1. Security Overview

FeedOracle is a data infrastructure platform. We aggregate, normalize, and sign public data from blockchain networks, central banks, and climate organizations. The security posture reflects this scope: we do not hold customer funds, process payments on behalf of users, or store sensitive personal data beyond API credentials.

Security Principles

Transport Security

LayerImplementation
TLS1.2 and 1.3, managed via Cloudflare
HSTSEnabled with max-age=31536000; includeSubDomains
CertificateCloudflare-issued, auto-renewed
DDoS ProtectionCloudflare WAF + rate limiting

Server Security

ControlImplementation
SSH AccessKey-based only, password authentication disabled
FirewallUFW with deny-by-default, explicit port allowlisting
Intrusion Preventionfail2ban with aggressive ban thresholds
OS UpdatesUnattended security updates enabled
Service IsolationDedicated systemd services with restricted permissions

2. Key Management & Signatures

FeedOracle uses ECDSA (secp256k1) signatures to provide cryptographic proof of data delivery. This is the same curve used by Bitcoin and Ethereum, enabling independent verification by any client.

Signing Architecture

ComponentDetails
AlgorithmECDSA with secp256k1 curve (ES256K)
Key FormatPEM-encoded, file-system stored with restricted permissions (0600)
Signing ScopeAPI response body (JSON payload + timestamp + endpoint path)
VerificationJWKS (canonical): /.well-known/jwks.json · Alias: /jwks · PEM export: /.well-known/feedoracle-signing.pub

Key Lifecycle

EventPolicy
Key generationGenerated on-server using OpenSSL, never transmitted
Key rotationAnnual rotation target. Old keys remain valid for verification of historical signatures for 12 months after rotation.
Key compromiseTarget: immediate revocation and re-signing of active evidence packs. Target: notification to enterprise customers within 24 hours.
Key storageFile-system, restricted to signing service user. Not stored in databases or version control.

On-Chain Anchoring

Evidence hashes are anchored to public blockchains for tamper-proof timestamping:

ChainPurposeFrequencyVerifiable At
XRPLPrimary anchor (memo field)Per-reportXRPScan
XRP LedgerSecondary anchorPer-transactionXRPScan

3. Access Controls

API Authentication

MethodDetails
AuthenticationAPI key via X-API-Key header or api_key query parameter
Key format64-character hex string, unique per account
Key provisioningAutomated via dashboard registration
Key revocationImmediate via dashboard or support request
Rate limitingPer-key, tiered by subscription plan

Tiered Access

TierRate LimitEndpoints
Free100 req/dayCore carbon + RWA (read-only)
Developer5,000 req/dayAll public endpoints
Professional50,000 req/dayAll endpoints + Evidence Packs
EnterpriseCustomAll endpoints + S3 exports + priority

Administrative Access

ScopeControl
Server accessSSH key-only, restricted to operations team
Database accessLocal socket only, no remote connections
DeploymentManual review required, no automated deployments to production
Third-party accessNo third-party administrative access to production systems

4. Availability & SLOs

Live status: uptime.feedoracle.io — public monitoring dashboard with historical uptime data.

Service Level Objectives

MetricTargetMeasurement
API Availability99.5% monthlyUptime monitor (1-min intervals)
Response Time (p95)< 500msUptime monitor
Data Freshness (on-chain)≤ 15 minutesPer-endpoint internal metric
Data Freshness (scores)≤ 24 hoursDaily recalculation
On-Chain Anchoring≤ 24 hoursVerifiable on-chain
Note: These are operational targets (SLOs), not contractual guarantees. Enterprise customers may negotiate custom SLAs with defined remedies. Contact enterprise@feedoracle.io.

Incident Response

SeverityDefinitionResponse TargetUpdate Frequency
P1 — CriticalComplete API outage30 minutesEvery 30 min
P2 — MajorDegraded performance or partial outage2 hoursEvery 2 hours
P3 — MinorNon-critical issue, single endpoint24 hoursDaily
P4 — InformationalCosmetic or documentation issueBest effortOn resolution

Maintenance Policy

Planned maintenance is performed during low-traffic windows (typically 02:00–05:00 CET) and announced at least 48 hours in advance via the status page. Enterprise customers receive email notification.

5. Logging & Monitoring

SystemWhat Is LoggedRetention
API access logsEndpoint, timestamp, response code, API key hash, latency90 days
Application logsService events, errors, data refresh cycles30 days
Security logsSSH access, failed auth attempts, firewall events90 days
Anchor logsOn-chain transaction hashes, Merkle rootsPermanent (on-chain)

Alerting

Alert TypeChannelResponse
Service downTelegram + uptime monitorTarget: immediate investigation
High error rateTelegram alertsWithin 15 minutes
Stablecoin deviation (RLUSD)Circuit breaker + TelegramAutomatic + manual review
Failed anchorTelegram alertsNext business day
Disk/resource thresholdHealth check systemHourly automated checks
What is NOT logged: Request bodies, full API keys (only hashed), IP addresses in application logs (only in nginx access logs with standard retention).

6. Data Handling & Retention

Data Categories

CategoryExamplesStorageRetention
Public blockchain dataTVL, transactions, holder countsSQLite + ClickHouseIndefinite
Public economic dataFRED rates, ECB data, World BankSQLiteIndefinite
Derived scoresRisk scores, CCI scoresSQLiteIndefinite (versioned)
Evidence artifactsSigned evidence packs, Merkle proofsFile system + on-chainIndefinite
API credentialsAPI keys, email addressesJSON/SQLite (encrypted at rest)Until account deletion
Access logsRequest metadataLog files90 days

Data Not Collected

Backup Policy

ComponentFrequencyMethodRetention
Website & configurationDaily (03:00 CET)Compressed archive7 days rolling
RWA data & modelsDailyCompressed archive7 days rolling
Carbon monitoring dataDailyCompressed archive7 days rolling
Off-site syncDailyrsync to EU backup server7 days rolling
RPO/RTO targets: Recovery Point Objective: ≤ 24 hours. Recovery Time Objective: ≤ 4 hours for critical services.

7. Infrastructure & Data Residency

ComponentLocationPurpose
Primary API serversGermany (netcup GmbH)API processing, databases, signing
Gateway serverGermany (netcup GmbH)Orchestration, monitoring, off-site backup
CDN / DDoSCloudflare (EU primary, global edge)TLS termination, caching, protection
On-chain anchorsXRPL (active), Polygon (planned)Tamper-proof timestamping

Data Residency Statement

All customer data and derived data products are stored exclusively on EU-based infrastructure (Germany). Cloudflare may route requests through non-EU edge nodes for performance, but does not persistently store API response data. On-chain anchors contain only cryptographic hashes (SHA-256) and contain no personally identifiable or commercially sensitive information.

8a. Subprocessors (Data Processing)

The following third-party service providers process data on behalf of FeedOracle in the GDPR sense:

ProviderPurposeData ProcessedRegion
netcup GmbHInfrastructure hostingAll application dataGermany (EU)
Cloudflare, Inc.CDN, DDoS protection, TLS terminationHTTP requests (transit only)Global (EU primary)
ISRG (Let's Encrypt)TLS certificatesDomain names (automated issuance)US (automated)

No customer data is shared with analytics, advertising, or AI training services. Subprocessor changes are documented in the changelog below. Enterprise customers can subscribe to change notifications via enterprise@feedoracle.io.

8b. External Data Sources

FeedOracle aggregates publicly available data from the following third-party sources. These are not subprocessors; no customer data is transmitted to them. FeedOracle consumes their published APIs or datasets.

SourceData CategoryIntegration
DeFiLlamaProtocol TVL, RWA category dataPublic API
Federal Reserve FREDT-Bill rates, CPI, economic indicatorsPublic API
ECB (European Central Bank)Euro area rates, monetary policy dataPublic API
World BankCountry-level economic indicatorsPublic API
Ankr Multi-Chain RPCOn-chain data across 50+ networksPublic API
GeckoTerminalDEX liquidity, trading pairsPublic API
CCRIBlockchain energy and carbon ratingsPublic API
EMBER ClimateGlobal electricity and emissions dataPublic API
VeChain ToolChainDNV-certified carbon lifecycle dataPublic API
ClimatiqEmission factorsCommercial API
EU ETSCarbon allowance pricingPublic data

Full source documentation including update frequencies and methodology: Methodology & Sources.

8c. Anchoring Networks (Public Chains)

Evidence hashes are anchored to public, permissionless blockchains for tamper-proof timestamping. Only cryptographic hashes (SHA-256) are written on-chain. No customer data, PII, or commercially sensitive information is published.

NetworkPurposeData WrittenVerifiable At
XRPLPrimary anchor (per-report)SHA-256 hashes onlyXRPScan
XRP LedgerSecondary anchorSHA-256 hashes onlyXRPScan

Public blockchains are decentralized networks, not service providers. FeedOracle has no contractual relationship with or control over these networks.

9. Vulnerability Disclosure

Reporting a Vulnerability

If you discover a security vulnerability in FeedOracle's systems, we ask that you report it responsibly.

FieldDetails
Contactsecurity@feedoracle.io
EncryptionPGP key available on request
AcknowledgmentWithin 48 hours of receipt
Initial assessmentWithin 5 business days
Resolution targetCritical: 72 hours. High: 14 days. Medium/Low: 30 days.

Scope

In scope: feedoracle.io, api.feedoracle.io, analytics.feedoracle.io, and all API endpoints documented at /docs.html.

Out of scope: Third-party services (DeFiLlama, FRED, Ankr, etc.), social engineering attacks, denial of service testing.

Safe Harbor

We will not pursue legal action against researchers who report vulnerabilities in good faith, follow this disclosure process, and avoid accessing or modifying customer data.

10. Compliance Framework Mapping

FeedOracle maps operational practices to recognized frameworks. These mappings support vendor due diligence but are not certifications.

FrameworkStatusDocumentation
ISO 27001:2022Design ReferenceSecurity Controls
ISO/TC 307Design ReferenceStandards Alignment
DORA (EU)Supports ReviewsDORA Support Pack
SOC 2 Type IITarget Q4 2026Planned
MiCA (EU)Data ProviderMiCA Support
Honest note: FeedOracle is not yet ISO 27001 certified or SOC 2 attested. We have designed controls with reference to these frameworks and document our alignment transparently. If your procurement process requires formal certification, please contact us to discuss our roadmap and interim evidence packages.

11. Enterprise Procurement Pack

Pre-packaged documentation for vendor due diligence and procurement workflows:

DocumentContentsFormat
Security ControlsISO 27001 Annex A mappingHTML / MD
Self-DeclarationSecurity posture summaryMD
DORA Support PackThird-party risk review evidencePDF
Data Residency StatementEU hosting, subprocessorsThis page (Section 7)
SLO DocumentationAvailability targets, incident processThis page (Section 4)
Methodology & SourcesClaim documentation, data sourcesHTML
OpenAPI SpecificationComplete API schemaYAML / JSON

Need a custom evidence package for your procurement process?

We work with your vendor risk team to provide the specific documentation you need.

enterprise@feedoracle.io

12. Changelog

DateChangeSection
9 Feb 2026Section 8 split into Subprocessors / External Data Sources / Anchoring Networks; absolute-language softened to targets; trust center restructured8, 2, 5
28 Jan 2026Initial Trust & Evidence page published

Material changes to security controls, subprocessors, or data handling practices are documented here. Enterprise customers can subscribe to change notifications.