Show the Proof

Verify any FeedOracle evidence artifact in 30 seconds. Check hashes, signatures, and blockchain anchors.

How Verification Works

1

Fetch the signed report

Every API response contains a content_hash (SHA-256) and signature (ECDSA ES256K) alongside the data payload.

2

Get the public key

Our signing key is published at /.well-known/jwks.json in standard JWK format. Key ID: feedoracle-prod-2026.

3

Verify content hash

Recompute SHA-256 of the data payload. If the hash matches content_hash, the data is untampered.

4

Check blockchain anchor

The hash is anchored on Polygon. Look up the transaction on PolygonScan to confirm the timestamp is immutable.

terminal
# 1. Fetch a signed report
curl -s -H "X-API-Key: YOUR_KEY" \
  "https://api.feedoracle.io/v1/rwa/risk/ondo-yield-assets" > report.json

# 2. Get the public key
curl -s "https://feedoracle.io/.well-known/jwks.json" > jwks.json

# 3. Verify content hash
jq -cS 'del(.evidence)' report.json | sha256sum
# Compare with .evidence.payload_hash.hex

# 4. Verify ECDSA signature (ES256K)
# Full guide: feedoracle.io/docs.html#verification

What Verification Proves

What It Does Not Prove

Signing Algorithm
ECDSA / ES256K (secp256k1)
Key ID
feedoracle-prod-2026
Anchor Chain
Polygon PoS
View JWKS →
Deep link: feedoracle.io/verify/{report-id}