feedoracle-compliance

MiCA compliance evidence and stablecoin risk scoring for regulated tokenized markets. 27 MCP tools with ES256K-signed responses. Use when the user explicitly asks about stablecoin compliance, MiCA regulatory status, or needs verifiable evidence for audit workflows.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "feedoracle-compliance" with this command: npx skills add feedoracle/feedoracle-compliance

FeedOracle Compliance Intelligence

FeedOracle provides verifiable compliance evidence for AI agents operating in regulated tokenized markets. Every response is ES256K-signed (JWKS-verifiable) and anchored on public networks (Polygon + XRPL).

27 MCP tools across compliance, risk, evidence, KYA (Know Your Agent), and audit verification — monitoring 105+ stablecoins across 18 MiCA articles.

MCP Server URL: https://feedoracle.io/mcp/ Auth: Free tier requires no API key (300 units/day). Optional FEEDORACLE_API_KEY for higher limits. Privacy Policy: https://feedoracle.io/privacy Trust Policy: https://github.com/feedoracle/feedoracle-mcp/blob/main/docs/TRUST_POLICY.md

Authentication

TierAPI Key?Limits
FreeNot required300 units/day, read-only tools
ProOptional FEEDORACLE_API_KEY15,000 units/mo
AgentOptional FEEDORACLE_API_KEY150,000 units/mo
EnterpriseCustomUnlimited

No environment variables are required. The free tier works without any configuration.

When to use this skill

Use this skill only when the user explicitly requests one of the following:

  • Stablecoin MiCA compliance status or issuer due diligence
  • Verifiable evidence for compliance review or audit workflows
  • Stablecoin risk scores, peg monitoring, or reserve backing data

This skill does NOT auto-invoke. It should only be called in response to a direct user request about compliance, MiCA, or stablecoin risk topics.

Data Handling & Privacy

What each tool sends to feedoracle.io

Read-only tools (24 of 27) — send only a token symbol: These tools send a single parameter (e.g. token_symbol: "USDC") and receive signed evidence back. No conversation content, no user data, no PII is transmitted.

Includes: compliance_preflight, mica_status, mica_full_pack, mica_market_overview, peg_deviation, peg_history, significant_issuer, interest_check, document_compliance, reserve_quality, rlusd_integrity, evidence_profile, evidence_leaderboard, evidence_bundle, custody_risk, market_liquidity, macro_risk, ai_explain, ai_provenance, kya_status, audit_query, audit_verify, ping, generate_report

ai_query — sends question text (user-initiated only): This tool sends the user's natural language question to feedoracle.io for routing to the correct evidence API. Only invoke when the user explicitly asks a compliance question. Do not send conversation history, PII, or unrelated text.

SentNOT sent
The specific question textConversation history
Optional token symbolUser identity or PII

kya_register — sends agent metadata (user-initiated only): Registers an agent identity for trust scoring. Only invoke when the user explicitly requests agent registration.

SentNOT sent
Agent name, purpose, org nameConversation content
Contact email (user-provided)User browsing data

audit_log — sends decision text (user-initiated only): Logs a compliance decision with evidence references. Only invoke when the user explicitly requests decision logging.

SentNOT sent
Decision (PASS/WARN/BLOCK)Full conversation logs
Reasoning text (user-provided)User identity or PII
Evidence request IDsUnrelated context

Data retention

  • Read-only queries: Stateless — no data stored
  • KYA profiles: Stored until deletion requested
  • Audit trail: Append-only, retained for compliance verification
  • Full policy: https://feedoracle.io/privacy
  • GDPR: Operated from Germany, Art. 6(1)(b)

MCP Tools (27)

Compliance — 11 tools (read-only, sends token symbol only)

ToolDescription
compliance_preflightPre-flight PASS/WARN/BLOCK decision
mica_statusMiCA authorization status (ESMA/EBA cross-referenced)
mica_full_packFull 12-article MiCA evidence pack
mica_market_overviewMarket-wide MiCA status dashboard
peg_deviationReal-time Art. 35 peg deviation
peg_history30-day peg stability with depeg events
significant_issuerArt. 45/58 significant issuer check
interest_checkArt. 23/52 interest prohibition scan
document_complianceArt. 29/30/55 recovery/redemption/audit
reserve_qualityArt. 24/25/53 reserve composition
rlusd_integrityRLUSD reserve attestation

Risk & Evidence — 6 tools (read-only, sends token symbol or protocol name only)

ToolDescription
evidence_profileMulti-dimensional evidence grade A-F
evidence_leaderboardTop protocols by evidence grade
evidence_bundleMulti-framework evidence aggregation
custody_riskCustodian SIFI status, concentration risk
market_liquidityDEX liquidity depth, exit channels
macro_riskUS macro risk composite (86 FRED series)

AI Gateway — 3 tools

ToolDescriptionData sent
ai_queryNatural language evidence queryQuestion text (user-initiated only)
ai_explainGrade explanation with counterfactualToken symbol only
ai_provenanceCryptographic provenance chainToken symbol only

KYA (Know Your Agent) — 2 tools

ToolDescriptionData sent
kya_registerRegister agent identity (user-initiated only)Agent metadata (name, purpose, org, email)
kya_statusCheck trust level (read-only)Client ID only

Audit Trail — 3 tools

ToolDescriptionData sent
audit_logLog decision (user-initiated only)Decision, reasoning, evidence IDs
audit_queryQuery history (read-only)Client ID only
audit_verifyVerify chain integrity (read-only)Client ID only

System — 2 tools

ToolDescriptionData sent
pingConnectivity testNothing
generate_reportSigned PDF report (requires API key)Report type only

Behavior Instructions

  1. User-initiated only: Only call FeedOracle tools when the user explicitly asks about compliance, MiCA, stablecoins, or evidence. Never auto-invoke.
  2. Verify before claiming: Do not assert compliance status without calling mica_status first. Present data and let the user decide.
  3. Write tools require explicit consent: Only call audit_log, kya_register, or generate_report when the user explicitly requests these. Never auto-invoke write tools.
  4. Minimal data in ai_query: Send only the specific compliance question — never include conversation history, PII, or unrelated context.
  5. Cite evidence: Reference the ES256K signature, pack_id, and JWKS URL from responses.
  6. Be precise: Use "verifiable evidence" and "signed compliance data" — not absolute compliance claims.

Controlling Invocation Scope

This skill is designed to be invoked only on explicit user request. If your agent framework supports trigger configuration:

  • Restrict triggers to explicit compliance/MiCA/stablecoin keywords only
  • Disable auto-invocation if your use case does not require automatic compliance checks
  • Sandbox first — test with non-sensitive queries before production use

The skill contains no code, no installation payload, and no persistent background processes. All external communication is to feedoracle.io over HTTPS only.

Connection

# Claude Code
claude mcp add --transport http feedoracle https://feedoracle.io/mcp/

# Claude Desktop (claude_desktop_config.json)
{
  "mcpServers": {
    "feedoracle": {
      "url": "https://feedoracle.io/mcp/"
    }
  }
}

Error Handling

  • 401: Invalid API key — use free tier without auth, or verify your key
  • 404: Symbol not tracked — check supported assets at feedoracle.io
  • 429: Rate limit — wait 60 seconds, retry once
  • Trust level insufficient — register via kya_register (only if user requests)

API keys: feedoracle.io/pricing | Docs: github.com/feedoracle/feedoracle-mcp

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

EU AI Act Compliance for Autonomous Agents

EU AI Act Compliance for Autonomous Agents. Complete compliance toolkit for AI agent commerce: EU AI Act risk classification, Annex IV technical documentatio...

Registry SourceRecently Updated
1800Profile unavailable
Security

VCF Regulatory Compliance

An MCP server that interfaces with VMware Aria Operations to run regulatory compliance checks (ISO 27001, PCI DSS, CIS, etc.) against the VCF environment.

Registry SourceRecently Updated
1000Profile unavailable
Security

AxonFlow Governance Policies

Govern OpenClaw with AxonFlow — block dangerous commands, detect PII, prevent data exfiltration, protect agent config files, explain policy decisions, grant...

Registry SourceRecently Updated
2371Profile unavailable
Security

SidClaw Governance

Add policy evaluation, human approval, and audit trails to any tool. Powered by SidClaw.

Registry SourceRecently Updated
1120Profile unavailable