FeedOracle Whitepaper

Evidence-Grade Data Infrastructure for Regulated Workflows

Version 3.3 · February 27, 2026

Download as PDF API Docs →

Document Control

Version3.0.0
Date14 February 2026
StatusPublished
Changelog v3.2 (Feb 24, 2026): Architecture updated to CORE + 4 Modules + MCP. Added Verified Reports, Payment Infrastructure, A2A Monetization, Report Verification to Delivered. New "In Progress" roadmap section. Regulatory source citations added to Legal. Proof wording standardized (XRPL live, Polygon deployed). SOC 2 status updated to Audit-ready. Version synchronized across all formats.

Table of Contents

  1. Product Overview
  2. Executive Summary
  3. The Problem
  4. The Solution
  5. CORE — RWA Risk Oracle
  6. MODULE 1 — MiCA Regulatory Evidence (105+ Stablecoins)
  7. MODULE 2 — Carbon & ESG Context
  8. MODULE 3 — DORA Compliance
  9. MODULE 4 — CSRD/ESRS Reporting
  10. MCP Server & Olas Mech — AI Agent Access
  11. Architecture
  12. Attestation & Evidence
  13. Data Quality
  14. Security & Operations
  15. Target Users
  16. Competitive Landscape
  17. Commercials
  18. Roadmap
  19. Legal & Disclaimers
  20. Contact
  21. Glossary

1. Product Overview

FeedOracle is evidence-grade data infrastructure for regulated workflows. The platform delivers multi-source risk intelligence for tokenized assets — with every API response cryptographically signed and anchored on-chain for auditability.

The platform is built on a one core engine, four compliance modules + AI agent layer architecture:

⚡ CORE: RWA Risk Oracle 📋 MODULE 1: MiCA Regulatory Evidence 🌱 MODULE 2: Carbon & ESG Context 🛡️ MODULE 3: DORA Compliance 📊 MODULE 4: CSRD/ESRS Reporting 🤖 MCP: AI Agent Access (18 Tools)
ComponentRolePurposeKey Output
RWA Risk Oracle⚡ COREMulti-dimensional risk scoring for 61+ tokenized asset protocols across 9 vectorsComposite risk scores, anomaly detection, yield analysis
MiCA Regulatory Evidence📋 Module 1Structured compliance metadata for EU MiCA/DORA workflowsLegal state analysis, jurisdiction mapping, identifier registry
Carbon & ESG Context🌱 Module 2Per-chain carbon footprint with ISO 14040 methodologyCO₂ metrics, green scores, CSRD-ready ESG output
DORA Compliance🛡️ Module 3Digital Operational Resilience Act evidence infrastructureICT incident reporting, vendor risk assessment, business continuity evidence
CSRD/ESRS Reporting📊 Module 4Corporate Sustainability Reporting with 5 dedicated APIsEU Taxonomy, materiality, emissions, social metrics, governance
MCP Server🤖 Agent LayerModel Context Protocol with 18 tools for AI agentsPre-trade compliance, MiCA status, custody risk, evidence generation

All components share a common evidence layer: ECDSA-signed responses, SHA-256 hashing, Evidence Pack Manifests (EPM), and on-chain anchoring (XRPL live per-transaction, Polygon contract deployed). The platform runs 230+ production endpoints across 4 compliance modules.

Core Principles

FeedOracle is an independent infrastructure provider with no formal partnership, endorsement, or affiliation with any blockchain foundation, regulatory body, or data source referenced in this document.

2. Executive Summary

Regulated institutions entering tokenized assets face a data gap. MiCA introduces disclosure requirements for CASPs (transitional period ends June 2026; stablecoin rules already in force). DORA raises expectations around operational traceability. CSRD/ESRS requires ESG reporting. Yet no infrastructure delivers risk intelligence for RWA protocols with the evidence trail that institutional workflows demand.

FeedOracle closes this gap with three capabilities:

  1. Multi-source risk scoring — 61 RWA protocols and 105+ stablecoins scored across 9 independent risk dimensions from 5 data sources, enriched with FRED macro economic benchmarks.
  2. Regulatory evidence — MiCA compliance for 105+ stablecoins (Significant Issuer detection, reserve drift monitoring, interest scanning), DORA operational resilience (incident reporting, vendor risk, business continuity), CSRD/ESRS reporting (5 APIs), ISO 20022 validation — structured for audit-ready workflows.
  3. Delivery proof — Every data point wrapped in ECDSA-signed Evidence Packs with SHA-256 hashing, JWKS-verifiable signatures, and on-chain anchoring (XRPL live, Polygon deployed).
  4. AI agent access — MCP Server with 18 compliance tools for Claude, Cursor, and autonomous agents. Live on Olas Mech marketplace (Gnosis) with 133+ verified deliveries.

The result: institutions can integrate verifiable risk data into their existing compliance workflows without building the data infrastructure themselves.

3. The Problem

The Disclosure Gap

Financial institutions evaluating tokenized assets need risk data that meets institutional standards. Current blockchain data providers focus on DeFi price feeds and analytics — not on the structured, evidence-grade data that compliance teams require. MiCA's CASP transitional deadline (June 2026) creates immediate urgency for CASPs, exchanges, and DeFi protocols.

Missing Audit Trail

When auditors ask "Can you prove what data you used for this decision?", traditional API calls leave no verifiable trail. Screenshots and PDF attestation reports are not machine-readable, not verifiable, and not auditable. Institutions need cryptographic evidence of data delivery.

Procurement Friction

Enterprise procurement requires: EU data residency documentation, incident management procedures, subprocessor registers, SLO evidence, and exit strategies. Few blockchain data providers deliver this level of operational documentation.

Fragmented Intelligence

Assessing a single RWA protocol today requires pulling data from 5+ independent sources (on-chain metrics, market data, macro indicators, regulatory databases, ESG scores), normalizing it, and creating a defensible risk view. This is expensive and error-prone when done manually.

4. The Solution

ProblemFeedOracle Solution
No unified RWA risk view61 RWA protocols & 105+ stablecoins scored across 9 risk dimensions from 5 data sources, enriched with FRED macro benchmarks
Missing audit trailECDSA-signed Evidence Packs with SHA-256 hashing, JWKS verification, and on-chain anchoring (XRPL live, Polygon deployed)
Fragmented regulatory dataMiCA compliance (105+ stablecoins, Art. 44 Significant Issuer, Art. 25 reserve monitoring), DORA (3 APIs), CSRD (5 APIs), ISO 20022 — unified evidence infrastructure
No ESG/carbon data per chainPer-chain carbon footprint (50+ networks), ISO 14040 methodology, CSRD-ready output
Enterprise procurement barriersEU-hosted infrastructure, documented controls, subprocessor register, SLO evidence
No machine-readable complianceREST APIs with consistent JSON schemas, OpenAPI 3.0 specification, configurable policy outputs

5. CORE — RWA Risk Oracle

The RWA Risk Oracle is FeedOracle's core product. It provides real-time multi-dimensional risk scoring for tokenized asset protocols, designed for institutional portfolio assessment, due diligence, and ongoing monitoring.

Coverage

The oracle currently scores 61 RWA protocols and monitors 105+ stablecoins across 12 jurisdictions from 5 independent data sources. Coverage spans regulated stablecoins, tokenized treasuries, private credit, real estate, commodities, equities, insurance, and XRPL native assets.

Methodology note: TVL figures are sourced from DeFiLlama and reflect aggregate protocol TVL at time of data refresh (daily). Full methodology available at docs/methodology.

9 Risk Dimensions

Every protocol is scored across 9 independent dimensions, each sourced from verified institutional data providers:

📊 TVL WeightProtocol scale & concentration
Source: DeFiLlama
📈 Yield SpreadDeviation vs. T-Bill benchmark
Source: FRED
🔀 DiversificationChain & asset mix (HHI analysis)
Source: On-chain
⏱️ MaturityProtocol age & track record
Source: On-chain
⚖️ RegulatoryJurisdiction risk flags
Source: Regulatory registers
🏛️ Institutional BackingKnown institutional participants
Source: Public disclosures
💧 DEX LiquiditySecondary market depth
Source: GeckoTerminal
⛓️ On-Chain ActivityTransaction patterns & health
Source: Etherscan, Ankr
🌱 ESG / CarbonSustainability indicators
Source: CCRI, EMBER

Scoring Methodology

Each dimension produces a normalized score (0–100). The composite risk score is a weighted aggregate with configurable weights per institutional use case. Default weights are published in the API documentation. Scores are deterministic: the same input data always produces the same output score.

Anomaly Detection

Z-score outlier analysis flags unusual protocol behavior across all dimensions. Configurable alert thresholds enable automated monitoring and early warning signals for portfolio risk management.

Macro Economic Enrichment

The CORE engine is enriched with macro economic data from FRED (Federal Reserve Economic Data), ECB, and World Bank. This enables yield-spread analysis against T-Bill benchmarks, credit spread monitoring, recession probability indicators, and economic health indices — providing institutional context for RWA risk assessment.

Key Endpoints

EndpointMethodDescription
/v1/rwa/riskGETAll scored protocols with composite scores
/v1/rwa/risk/{slug}GETDetailed risk breakdown for single protocol
/v1/rwa/risk/{slug}/pdfGETPDF evidence report
/v1/rwa/marketGETAggregate market view
/v1/macro/indicatorsGETMacro economic enrichment

6. MODULE 1 — MiCA Regulatory Evidence

Module 1 provides the most comprehensive MiCA compliance infrastructure available. It covers 105+ stablecoins with real-time peg monitoring, reserve drift detection, significant issuer classification (Art. 44), interest prohibition scanning (Art. 23/52), document compliance verification (Art. 29/30/55), and ESMA register mirroring — plus legal state analysis, jurisdiction mapping, and CCI scoring. All outputs are Evidence Pack-wrapped for audit trails.

Regulatory context: MiCA CASP transitional period ends June 30, 2026 (stablecoin rules already in force since June 2024). Exchanges, CASPs, and DeFi protocols handling EU-regulated crypto-assets need machine-readable compliance data. Module 1 provides the evidence artifacts.

6.1 Legal State Analysis

Contract Powers & Ownership

Source: On-chain governance analysis, public disclosures

Analysis of smart contract governance structures, ownership patterns, upgrade mechanisms, and dispute resolution paths. Returns structured metadata for regulatory due diligence.

Endpoint: GET /v1/rwa/legal-state/{slug}

6.2 Jurisdiction Mapping

12 Jurisdictions + Sanctions Screening

Coverage: 12 jurisdictions · OFAC, EU, UN sanctions lists

Maps RWA protocols to their operating jurisdictions and screens against OFAC, EU, and UN sanctions lists. Returns jurisdiction risk flags, regulatory regime classification, and cross-border compliance indicators.

Endpoint: GET /v1/rwa/compliance/{slug}

6.3 Identifier Registry

LEI, ISIN/CUSIP, Custody Details

Source: Regulatory registers, public filings

Registry of institutional identifiers for RWA protocols: Legal Entity Identifiers (LEI), ISIN/CUSIP mappings, custody provider details, and issuer metadata. Machine-readable for compliance system integration.

Endpoint: GET /v1/rwa/registry/{slug}

6.4 Stablecoin Compliance

MiCA Classification Engine (105+ Stablecoins)

Coverage: USDC, EURC, RLUSD, USDT, DAI · Update: On-demand (5-min cache)

Configurable policy classification based on EU regulatory register data (ECB, ESMA CASP Register, NY DFS). Returns ACCEPTED/REJECTED status with machine-readable reason codes and configurable policy modes (strict, moderate, relaxed).

Endpoint: GET /v3/stablecoin/mica/{symbol}

CCI Score (Crypto Compliance Index)

Scale: 0–100 with letter grades (A+ to F)

Composite regulatory compliance score. Weighted methodology: MiCA status (30%), reserve transparency (25%), jurisdiction risk (20%), audit frequency (15%), operational history (10%).

Endpoints: GET /v3/cci/{symbol} · GET /v3/cci/ranking

6.5 Operational Resilience Tools

Circuit Breaker Detection

Triggers: Peg deviation, volume anomaly, liquidity drop, oracle failure

Automated halt detection for DORA operational resilience. Returns ACTIVE/TRIGGERED status with severity level and signed Evidence Pack.

Endpoint: GET /v3/circuit-breaker/status

ISO 20022 Payment Validation

Engine: xmllint (libxml2) · Supported: pain.001.001.09

XML payment message validation against official ISO 20022 XSD schemas. Returns Evidence Pack with validation decision, error details, and SHA-256 hash.

Endpoint: POST /v3/iso20022/validate

6.6 Stablecoin Peg Monitor (105+ Tokens)

Real-Time Peg Deviation Tracking

Coverage: 105+ stablecoins · Update: Real-time · Source: Multi-exchange aggregation

Continuous peg health monitoring across 105+ stablecoins. Tracks deviation from peg, trading volume anomalies, and liquidity depth. Returns severity classification (STABLE / WARNING / CRITICAL / DEPEG) with configurable alert thresholds for automated monitoring.

Endpoints: GET /v3/stablecoin/mica/{symbol} · GET /api/v1/feeds/stablecoin · GET /v1/peg/status/{symbol}

6.7 Significant Issuer Detection (Art. 44)

MiCA Art. 44 Classification Engine

Criteria: €5B market cap, 10M holders, 2.5M daily transactions

Automated screening against MiCA Art. 44 significant issuer thresholds. Monitors market capitalization, holder count, and transaction volume to detect when stablecoins cross regulatory significance boundaries. Returns SIGNIFICANT / NON-SIGNIFICANT classification with evidence trail.

Endpoint: GET /v1/mica/significant-issuer/{symbol}

6.8 Reserve Drift Monitor (Art. 25)

Reserve Composition Deviation Detection

Monitoring: Continuous · Threshold: Configurable drift tolerance

Tracks reserve asset composition changes over time. Detects when reserve backing deviates from declared composition — critical for MiCA Art. 25 compliance (reserve of assets requirements). Flags unauthorized asset substitutions, concentration shifts, and quality downgrades.

Endpoint: GET /v1/mica/reserve-drift/{symbol}

6.9 Interest Prohibition Scanner (Art. 23/52)

MiCA Art. 23 & 52 Yield Detection

Scope: All monitored stablecoins · Regulation: EMT Art. 23, ART Art. 52

Scans for prohibited interest or yield mechanisms on e-money tokens (EMT) and asset-referenced tokens (ART). MiCA explicitly prohibits granting interest to token holders. This scanner detects staking yields, rebasing mechanisms, and distribution schemes that could violate Art. 23/52.

Endpoint: GET /v1/mica/interest-scan/{symbol}

6.10 Document Compliance Monitor (Art. 29/30/55)

White Paper & Disclosure Verification

Articles: Art. 29 (EMT white paper), Art. 30 (marketing), Art. 55 (ART white paper)

Monitors whether token issuers maintain compliant white papers and marketing communications as required by MiCA. Checks for mandatory disclosure elements, publication status, and update frequency. Returns compliance status with specific article references for gap remediation.

Endpoint: GET /v1/mica/document-compliance/{symbol}

6.11 ESMA Register Mirror

EU Regulatory Register API

Source: ESMA · Update: Daily sync

Machine-readable mirror of the ESMA register for authorized CASPs and licensed token issuers. Enables automated verification of regulatory status against the official EU register. Cross-references with internal MiCA classification for comprehensive compliance checks.

Endpoint: GET /v1/esma/register · GET /v1/esma/register/{entity}

7. MODULE 2 — Carbon & ESG Context

Module 2 provides per-chain carbon footprint data and sustainability indicators with ISO 14040 methodology. Designed for MiCA Art. 66 sustainability disclosures and CSRD/ESRS reporting requirements.

7.1 Chain-Level Carbon Scoring

Carbon Footprint Feed

Update: Daily · Coverage: 50+ blockchain networks · Source: CCRI, EMBER, Climatiq

Blockchain energy and emissions data: carbon per transaction, energy per transaction, consensus mechanism classification, and green score (0–100). Confidence scoring reflects source coverage and data freshness.

Endpoints: GET /api/v1/feeds/carbon/chains · GET /api/v1/feeds/carbon/{chain}

7.2 Data Provenance

VeChain ToolChain · ISO 14040/14044

Methodology: ISO 14040 Life Cycle Assessment framework

Carbon data follows ISO 14040/14044 Life Cycle Assessment methodology. Source provenance is documented per network, with cross-validation against multiple emission factor databases.

7.3 CSRD-Ready Output

ESG Scores for Portfolio Reporting

Frameworks: CSRD/ESRS, MiCA Art. 66

ESG scores integrated directly into RWA risk reports via the .esg_carbon field. Designed for inclusion in CSRD sustainability reports and MiCA Art. 66 CASP disclosures.

Endpoint: GET /v1/rwa/esg/{slug}

7.4 Grid Intensity

Regional Electricity Carbon Data

Update: 30 min · Source: UK Carbon Intensity API, EMBER, Climatiq

Regional electricity carbon intensity data for energy-aware applications and validator location analysis.

Endpoint: GET /api/v1/grid/intensity

8. MODULE 3 — DORA Compliance

Module 3 provides evidence infrastructure for the Digital Operational Resilience Act (EU 2022/2554). DORA requires financial entities to maintain ICT risk management frameworks, report incidents, test resilience, and manage third-party ICT risks. FeedOracle delivers machine-readable evidence artifacts for these requirements.

Regulatory context: DORA applies from January 17, 2025 to all EU-regulated financial entities including banks, insurers, investment firms, and their critical ICT third-party service providers. German insurance companies are actively building DORA compliance teams.

8.1 ICT Incident Reporting

Structured Incident Evidence Packs

Standard: DORA Art. 19 · Format: Machine-readable JSON with EPM wrapping

Generates structured incident report artifacts for major ICT-related incidents as required by DORA Art. 19. Captures incident classification, impact assessment, timeline, root cause analysis, and remediation steps — all wrapped in signed Evidence Packs for regulatory submission.

Endpoint: GET /v1/dora/incident-report

8.2 Third-Party Vendor Risk

ICT Third-Party Risk Assessment

Standard: DORA Art. 28-30 · Scope: Critical ICT service providers

Risk assessment framework for ICT third-party service providers. Evaluates concentration risk, exit strategies, subprocessor chains, data residency, and service level monitoring — aligned with DORA Art. 28-30 requirements for managing ICT third-party risk.

Endpoint: GET /v1/dora/vendor-risk

8.3 Business Continuity Evidence

Operational Resilience Documentation

Standard: DORA Art. 11-12 · Output: Signed evidence artifacts

Generates business continuity and disaster recovery evidence artifacts. Documents RPO/RTO targets, backup verification, failover testing results, and recovery procedures — structured for DORA Art. 11-12 ICT business continuity management requirements.

Endpoint: GET /v1/dora/business-continuity

9. MODULE 4 — CSRD/ESRS Reporting

Module 4 provides 5 dedicated APIs for Corporate Sustainability Reporting Directive (CSRD) requirements under the European Sustainability Reporting Standards (ESRS). Designed for financial entities reporting on digital asset portfolios and blockchain infrastructure sustainability.

9.1 EU Taxonomy Alignment

Activity Classification & Alignment Scoring

Framework: EU Taxonomy Regulation (2020/852) · ESRS E1-E5

Classifies blockchain and RWA protocol activities against the EU Taxonomy. Returns alignment scores for climate mitigation, climate adaptation, and do-no-significant-harm (DNSH) criteria.

Endpoint: GET /v1/csrd/taxonomy

9.2 Materiality Assessment

Double Materiality Analysis

Standard: ESRS 1 §§ 37-58 · Output: Impact & financial materiality scores

Provides double materiality assessment data for digital asset activities: impact materiality (effects on people and environment) and financial materiality (sustainability risks to the entity). Structured for ESRS disclosure requirements.

Endpoint: GET /v1/csrd/materiality

9.3 Emissions Data

Scope 1/2/3 Emissions for Blockchain Infrastructure

Standard: ESRS E1 · Sources: CCRI, EMBER, Climatiq

Chain-level and protocol-level greenhouse gas emissions data. Provides Scope 1 (direct), Scope 2 (electricity), and Scope 3 (value chain) emissions estimates for blockchain infrastructure — formatted for CSRD reporting templates.

Endpoint: GET /v1/csrd/emissions

9.4 Social Metrics

Workforce & Community Impact

Standard: ESRS S1-S4

Social sustainability indicators for RWA protocol assessment: workforce diversity, community impact, human rights due diligence, and consumer protection metrics. Complements environmental data for comprehensive ESG reporting.

Endpoint: GET /v1/csrd/social

9.5 Governance

Governance & Risk Management

Standard: ESRS G1 · Scope: Protocol & issuer governance

Governance indicators for RWA protocols and token issuers: board composition, risk management frameworks, compliance structures, audit mechanisms, and whistleblower protections. Key input for CSRD governance disclosures.

Endpoint: GET /v1/csrd/governance

10. MCP Server & Olas Mech — AI Agent Access

FeedOracle provides a Model Context Protocol (MCP) server with 18 compliance tools for AI agent integration. The MCP server enables Claude Desktop, Cursor, and any MCP-compatible client to access FeedOracle's evidence infrastructure programmatically — with every response cryptographically signed.

Transport

The MCP server supports two transport protocols: Server-Sent Events (SSE) at https://feedoracle.io/mcp/sse and Streamable HTTP. Both provide real-time, bidirectional communication for agent workflows.

18 MCP Tools

ToolDescription
compliance_preflightPre-trade regulatory check — PASS/WARN/BLOCK with reason codes
mica_statusMiCA compliance status for any stablecoin
evidence_profileFull evidence profile for any RWA protocol
custody_riskCustody provider risk assessment
market_liquidityDEX liquidity depth analysis (GeckoTerminal)
evidence_leaderboardProtocol ranking across 61 RWA protocols & 105+ stablecoins
rlusd_integrityRLUSD reserve verification with XRPL anchoring
macro_riskMacro economic risk indicators (FRED/ECB)
peg_deviationReal-time peg health for any stablecoin
significant_issuerMiCA Art. 44 significant issuer classification
interest_checkMiCA Art. 23/52 interest prohibition scan
document_complianceMiCA Art. 29/30/55 white paper verification
reserve_qualityMiCA Art. 25/53 reserve quality assessment
mica_full_packComplete MiCA compliance pack for any token
mica_market_overviewMarket-wide MiCA compliance overview
peg_historyHistorical peg deviation data
generate_reportGenerate signed PDF evidence reports
pingServer health check

Olas Mech Marketplace

FeedOracle is live on the Olas Mech marketplace (Gnosis Chain) with 8 tools available for autonomous agent-to-agent interaction. Service 2670 has processed 133+ verified deliveries with 100% acceptance rate. Pricing: 0.01 xDAI per request — enabling pay-per-call compliance checks without API key management.

Discovery

AI agents discover FeedOracle via: /llms.txt for LLM-native discovery, OpenAPI 3.0 spec at /docs/rwa-openapi.json, and the MCP server's built-in tool listing. All three discovery mechanisms are maintained and synchronized.

11. Architecture

FeedOracle operates as a layered data infrastructure:

Layer 6: AGENT ACCESS     MCP Server (18 tools), Olas Mech (Gnosis), llms.txt discovery
Layer 5: EVIDENCE         ECDSA Signatures, Evidence Packs, Multi-Chain Anchoring
Layer 4: COMPLIANCE       MiCA (105+ stablecoins), DORA, CSRD/ESRS, ISO 20022
Layer 3: API GATEWAY      230+ endpoints, REST API, authentication, rate limiting, OpenAPI 3.0
Layer 2: PROCESSING       Normalization, quality scoring, confidence calculation, risk aggregation
Layer 1: DATA SOURCES     Blockchain RPCs, CCRI, DeFiLlama, GeckoTerminal, FRED, ECB, ESMA, Ankr

The architecture maps to the product modules:

LayerCORE (RWA Risk)Mod 1 (MiCA)Mod 2 (Carbon/ESG)Mod 3 (DORA)Mod 4 (CSRD)
AgentMCP Server (18 tools) · Olas Mech (Gnosis, 8 tools) · llms.txt · OpenAPI 3.0
EvidenceECDSA + SHA-256 + JWKSCompliance EPMsSustainability EPMsIncident EPMsReporting EPMs
Processing9-vector scoring, anomaly detection105+ stablecoins, Art. 44, reserve drift, CCICarbon normalization, green scoringICT risk assessment, vendor scoringDouble materiality, taxonomy alignment
Data SourcesDeFiLlama, FRED, Ankr, GeckoTerminalECB, ESMA, OFAC, NY DFSCCRI, EMBER, ClimatiqInternal + client dataEMBER, CCRI, Climatiq, World Bank

API Specification

All endpoints are documented in OpenAPI 3.0 format with Swagger UI. Machine-readable discovery via llms.txt for AI agent integration.

12. Attestation & Evidence

Disclosure Attestation Protocol (DAP)

DAP creates cryptographic proof of data delivery. The protocol hashes API response payloads with SHA-256, aggregates hashes into Merkle trees, and anchors roots to public blockchains.

How It Works

  1. Hash: API response payload hashed with SHA-256
  2. Sign: ECDSA signature (ES256K) with JWKS-discoverable public key
  3. Aggregate: Hashes combined into Merkle trees (batched)
  4. Anchor: Hash anchored on XRPL (memo field). Gnosis Chain live via Olas Service 2670.
  5. Verify: Anyone can verify delivery timestamp via block explorer or API

What Gets Hashed

Included in HashExcluded from Hash
API response body (JSON)HTTP headers
Timestamp (ISO 8601)Client IP address
Endpoint pathAPI key (hashed separately)
Schema versionRequest parameters

Scope of Proof

DAP proves that specific data was delivered via API at or before the anchored block timestamp, and that post-delivery modification becomes detectable via hash mismatch. DAP is a delivery evidence mechanism — it does not verify upstream data correctness or constitute regulatory approval.

Anchoring Schedule

ModeFrequencyAvailability
Daily BatchOnce per 24hAll tiers
Hourly BatchOnce per hourEnterprise
Event-DrivenOn significant data changeEnterprise

Evidence Pack Manifest (EPM v1.0)

EPM extends DAP with a standardized manifest schema using DSSE-style envelopes and RFC 8785 deterministic hashing. Supports jurisdiction-aware metadata (EU/UK/US/Global). Every Evidence Pack contains: the signed data payload, ECDSA signature (ES256K), timestamp, schema version, source attribution, and Merkle proof. Public keys are discoverable via JWKS endpoint.

DAP API Endpoints

EndpointMethodDescription
/api/v2/attestation/testGETIntegrity test on all sources
/api/v2/attestation/sourcesGETList attested sources and TLS policies
/api/v2/attestation/anchor/latestGETBlockchain anchor status (XRPL)
/api/v2/attestation/merkleGETCurrent Merkle root
/api/v2/attestation/verify/{hash}GETVerify payload hash
/api/v1/epm/verifyPOSTVerify DSSE-wrapped EPM manifest

13. Data Quality

Pipeline

Sources → Ingestion → Validation → Normalization → Quality Scoring → API → DAP
         (scheduled)  (schema)    (units/format)   (confidence)     (REST) (anchor)

Quality Gates

GateCheckOn Failure
Schema ValidationResponse matches expected structureReject, log, use fallback
Freshness CheckTimestamp within thresholdFlag as stale, reduce confidence
Range ValidationValues within expected boundsFlag anomaly, manual review
Cross-ValidationCompare multiple sourcesUse median, flag divergence

Confidence Scoring

Every data point includes a confidence score (0.0–1.0) reflecting source availability, data freshness, and cross-validation status. Confidence scores are heuristic indicators — not statistical confidence intervals.

Staleness Handling

When primary sources are unavailable, the system attempts configured secondary sources. If all sources are unavailable, the API returns the last known value with a stale: true flag and reduced confidence. The staleness threshold is configurable per feed (default: 2× normal update interval).

14. Security & Operations

Security Controls

Operational controls informed by ISO/IEC 27001:2022 principles:

Control AreaImplementation
Access ControlAPI key authentication (X-API-Key header), tiered rate limits
CryptographyECDSA ES256K signing, SHA-256 hashing, TLS 1.2+ enforced
Network SecurityHSTS, CSP headers, firewall, Cloudflare DDoS protection
BackupDaily encrypted, cross-server sync within EU
LoggingRequest IDs, structured access logs, audit trail
Key ManagementECDSA key rotation, JWKS public key discovery

Service Level Objectives

MetricTargetMeasurement
API Availability99.5%Monthly uptime
Response Time (p95)<500ms95th percentile latency
Data Freshness≤15 minutesReal-time feeds
Attestation Anchor≤24 hoursTime to on-chain

Data Residency

ComponentLocationNotes
Primary InfrastructureGermany (netcup DE)API servers, databases
Backup StorageEUEncrypted, cross-server sync
CDN/EdgeGlobal (Cloudflare)Request routing, caching headers
Blockchain AnchorsXRPL (live), Gnosis (live via Olas Mech)Public blockchains

Recovery Targets

MetricTarget
RPO (Recovery Point Objective)≤24 hours
RTO (Recovery Time Objective)≤4 hours

Subprocessors

SubprocessorFunctionLocation
netcup GmbHInfrastructure hostingGermany
Cloudflare Inc.CDN, DDoS protection, DNSUS/EU (edge)
XRPL LedgerBlockchain anchoringDecentralized
Ripple (XRPL)Blockchain anchoringDecentralized

15. Target Users

Banks & Insurers

Portfolio risk assessment for RWA allocations. DORA-supporting evidence packs for third-party vendor risk documentation. Signed evidence artifacts for audit trails.

Asset Managers

Due diligence on tokenized funds. Yield spread analysis vs. T-Bill benchmarks. Smart contract risk signals. ESG/sustainability data for portfolio reporting.

Exchanges & CASPs

MiCA Art. 66 sustainability disclosures for listed crypto-assets. Stablecoin classification and monitoring. Structured data for regulatory reporting ahead of the June 2026 CASP transition deadline.

DeFi Protocols & DAOs

On-chain risk feeds for RWA integrations. DEX liquidity monitoring. Protocol-level risk scoring for governance decisions. Chainlink Functions integration for smart contract access.

RegTech Platforms

White-label compliance modules with API-first integration. OpenAPI spec, versioned schemas, bulk access for platform integration.

AI Agents & Autonomous Systems

Machine-readable API outputs with llms.txt discovery. Pay-per-call access model. DAP enables programmatic verification without human intervention.

16. Competitive Landscape

CategoryFocusExamples
Decentralized OraclesDeFi price feeds, on-chain data deliveryChainlink, Pyth, Redstone
Blockchain IndexersQuery layer for on-chain dataThe Graph, Goldsky
Research & AnalyticsMarket intelligence, reportingMessari, Dune, Nansen
Carbon RatingsSustainability assessmentsCCRI, Digiconomist
AML/KYTTransaction monitoring, wallet screeningChainalysis, Elliptic, TRM Labs
AI Agent ToolingMCP servers, agent marketplacesOlas, Fetch.ai, Autonolas
Evidence InfrastructureRegulatory verification + signed evidence + risk scoring + AI agent accessFeedOracle

Differentiation

17. Commercials

Pricing

TierPriceAPI CallsEvidence Packs
Free€0/mo100/day
Developer€49/mo5,000/day50/mo
Professional€299/mo50,000/day500/mo
EnterpriseCustomCustomCustom

Payment: Stripe (card) and XRPL crypto payments accepted for all paid tiers.

Evidence Packs are request-based: each API call that generates a signed Evidence Pack Manifest counts as one verification. API calls without Evidence Pack generation are not counted against the verification limit.

Enterprise Package

18. Roadmap

Forward-looking statement: This roadmap contains planned initiatives. Actual results may differ. No commitment to delivery dates, features, or timelines.

Delivered (Q1 2026)

InitiativeStatus
RWA Risk Oracle — 61+ protocols, 9 risk vectors, 5 data sourcesLive
MiCA Regulatory Evidence module (legal state, jurisdiction, registry)Live
Carbon & ESG module (50+ networks, ISO 14040)Live
Macro Economic Oracle (FRED + ECB enrichment)Live
XRPL AnchoringLive
Evidence Pack System with ECDSA signing + JWKSLive
MiCA Stablecoin Classification (105+ stablecoins)Live
CCI Score Engine (compliance ranking)Live
ISO 20022 Payment ValidationLive
Circuit Breaker Detection (DORA resilience)Live
Interactive Enterprise Demos (5 verticals)Live
MiCA Deep Compliance: Significant Issuer (Art. 44), Reserve Drift (Art. 25), Interest Scanner (Art. 23/52), Document Compliance (Art. 29/30/55), ESMA RegisterLive
DORA Compliance Module (incident reporting, vendor risk, business continuity)Live
CSRD/ESRS Module (5 APIs: taxonomy, materiality, emissions, social, governance)Live
MCP Server (18 tools, SSE + Streamable HTTP)Live
Olas Mech marketplace (Gnosis, 8 tools, 133+ deliveries)Live
Stablecoin Peg Monitor (105+ tokens, real-time)Live
Chainlink Functions integration (Polygon, Contract 0xd509...3EE)Live
L2 Intelligence APIs (7 chains)Live
Verified Reports System (5 types: RWA Risk, MiCA, DORA, Macro, CSRD) with PDF generation, XRPL-anchored proof panelLive
Payment Infrastructure — Stripe + USDC (Polygon), 4 tiers (Free / Developer €49 / Professional €299 / Enterprise)Live
Agent-to-Agent (A2A) Monetization — Pay-per-Call API (9 feeds, USDC on Polygon) + Olas Mech (0.01 xDAI/request, Gnosis)Live
Report Verification Infrastructure — public /verify endpoints with SHA-256 + ECDSA signature validationLive
Trust Center & Enterprise Procurement Pack (12 sections: security, SLOs, subprocessors, vulnerability disclosure, compliance mapping)Live
Public Status Page — Uptime Kuma with 37 monitors across 8 service groupsLive
CSRD/ESRS Data API — chain footprint, ESRS E1, EU energy mix, EU ETS pricingLive

In Progress (Q1–Q2 2026)

InitiativeStatus
Multi-chain Evidence Anchoring — XRPL (live), Polygon (contract deployed), Avalanche & Flare (grant applications submitted)In Progress
SOC 2 Type II — Trust Center live, compliance framework mapping complete, security controls documented, SLO evidence via Uptime Kuma (37 monitors). Pre-audit documentation ready; formal audit pending fundingAudit-ready
Chainlink BUILD program participationApplication submitted
Avalanche infraBUIDL() grant — C-Chain deployment, RWA Risk Oracle, Evergreen Subnet integrationApplication submitted
Flare Network grant — FTSOv2 Feed Value Provider, FDC compliance attestations, FAssets risk layerApplication ready
CSRD/ESRS template library — structured report templates for ESRS E1 disclosuresData API live, templates in development

Planned (Subject to Change)

InitiativePriority
ISO 20022 expansion (pacs.008, camt.053)Medium
WebSocket real-time feeds (SSE + Streamable HTTP already live via MCP)Medium
XRPL Grants program application (Spring 2026)High
Avalanche Evergreen Subnet integration for institutional evidence deliveryMedium
Flare FTSOv2 Feed Value Provider for compliance/risk data feedsMedium
Flare Data Connector (FDC) attestations for compliance eventsMedium
Developer SDK (npm package) for multi-chain FeedOracle integrationHigh

Resources

Documentationfeedoracle.io/docs
API ReferenceFull API Ref (238 Endpoints)
Trust & SecurityTrust Documentation
System StatusStatus Page
EnterpriseEnterprise Overview
Interactive DemosRWA · Insurance · Carbon · Stablecoin · Payments

FeedOracle provides data infrastructure and verifiable evidence artifacts. The platform does not provide financial, legal, or compliance advice. Compliance decisions remain with the institution and its qualified advisors.

Regulatory Sources

Regulatory timelines and classifications referenced in this document are based on the following official sources:

Forward-Looking Statements

This document contains forward-looking statements regarding planned features, roadmap items, and business strategy. Actual results may differ materially. No commitment to specific delivery dates, features, or timelines is expressed or implied.

No Endorsement

FeedOracle is an independent infrastructure provider. References to blockchain networks (XRPL, Polygon, Gnosis, Chainlink), regulatory bodies (ESMA, BaFin, ECB), or data sources (FRED, DeFiLlama) do not imply partnership, endorsement, or affiliation unless explicitly stated.

21. Glossary

A2A
Agent-to-Agent — automated interaction between AI/autonomous systems
CASP
Crypto-Asset Service Provider under MiCA regulation
CCI
Crypto Compliance Index — composite regulatory compliance score (0–100)
CSRD
Corporate Sustainability Reporting Directive (EU)
DAP
Disclosure Attestation Protocol — cryptographic proof of data delivery
DORA
Digital Operational Resilience Act (EU)
DSSE
Dead Simple Signing Envelope — standardized signing format
ECDSA
Elliptic Curve Digital Signature Algorithm (ES256K)
EPM
Evidence Pack Manifest — standardized signed evidence schema
ESRS
European Sustainability Reporting Standards
FRED
Federal Reserve Economic Data — macro economic data source
HHI
Herfindahl-Hirschman Index — concentration measurement
JWKS
JSON Web Key Set — public key discovery endpoint
MCP
Model Context Protocol — open standard for AI agent tool integration (Anthropic)
Mech
Olas Mech — decentralized AI agent marketplace on Gnosis Chain
MiCA
Markets in Crypto-Assets Regulation (EU) — stablecoin rules in force since June 2024, CASP transition ends June 2026
RPO
Recovery Point Objective — maximum acceptable data loss
RTO
Recovery Time Objective — maximum acceptable downtime
RWA
Real World Assets — tokenized traditional financial instruments
SLA
Service Level Agreement — contractual commitment
SLO
Service Level Objective — target performance metric
TVL
Total Value Locked — aggregate value deposited in a protocol