Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
eOracle addresses the Oracle problem from first principles. As the first oracle built on EigenLayer, we believe true innovation in blockchain data requires:
Decoupling complex problems into layers
Solving each layer with dedicated, high-quality solutions
Maintaining uncompromising security standards
Current Oracle solutions, managed by a few centralized organizations, create stagnation in blockchain innovation. Domain experts from diverse data fields are unable to bridge their valuable insights on the chain due to the complexity of building a secure Oracle infrastructure.
The eOracle stack changes this by providing production-ready infrastructure components. Data experts can now build custom Oracle solutions focused on their domain expertise while eOracle handles the security and infrastructure complexities. Through Oracle Validated Services (OVS), specialized data solutions can be built and deployed without compromising on security or decentralization.
These docs guide you through the core concepts of the OVS framework, introducing the components and features of the eOracle stack and outlining how to start building.
Oracle Validated Services (OVS) are decentralized Oracle protocols built on top of eOracle. The OVS framework introduces a new paradigm for Oracle design, focusing on separating infrastructure from specialized data solutions, creating a mature market with a clear separation of concerns.
By providing a platform for diverse participants to create specialized oracles, eOracle aims to foster a more competitive market that enhances the quality and reliability of data available to smart contracts. This approach not only democratizes access to data services but also ensures that blockchain applications can benefit from the expertise of a wide range of data and computation providers.
For a deeper understanding of the vision and necessity behind OVS, please refer to eOracle Vision
Oracles enhance blockchains by integrating off-chain data while maintaining the core properties of blockchains. Like blockchains, oracles eliminate dependence on a central third party by introducing redundancy through a distributed reporting system.
A decentralized oracle needs to address the following questions:
Sources - What are the qualitative sources for this type of data? What off-chain computation should be transmitted to the blockchain?
Aggregation - What is the optimal method for aggregating validator reports into a single value? Considerations include resistance to manipulation (robustness), performance, simplicity, and more.
Incentive Management and Security - How can validator participation be assessed and appropriately rewarded or penalized? In particular, how can misreports be detected and distinguished between honest mistakes and malicious manipulation attempts?
Answering these questions requires expertise in various domains, including data science, cryptography, game theory, and the specific field from which the data originates. We do not want a cryptographer performing poor data science nor a data scientist executing inadequate cryptography.
Potential OVS builders include:
Oracle-First Companies - Teams that build specialized oracle services using eOracle's infrastructure.
Oracle-Dependent Products - Projects that need custom Oracle solutions not currently available.
Internal Oracle Needs - Teams looking to connect their existing operations on-chain through Oracle integration.
Next, the key features of the eOracle stack are explored, which teams can use to build their OVS.
How does the eOracle protocol compare to a typical oracle?
Today's oracle landscape is dominated by a small group of companies that must build and maintain everything: infrastructure, security, node networks, and data solutions. This "do-it-all" approach has created an unsustainable bottleneck in blockchain innovation.
When diving deep into solving the oracle problem, two layers of complexity emerge that make any centralized solution fundamentally insufficient.
First is the inherent complexity of data itself. Each domain demands its own specialized understanding. Financial data requires sub-second updates and sophisticated anomaly detection. Social media data demands extreme throughput and ability to track emerging patterns in real-time. Risk and cyber analysis require complex prediction models and automated decision-making. Each domain comes with its own patterns, failure modes, and expertise requirements. A solution perfect for one becomes fundamentally flawed for another.
But that's only half the challenge. Building infrastructure for trustless data delivery - with high reliability, consistent uptime, and true decentralization - requires solving deep problems in cryptography, game theory, and distributed systems. The technical complexity here rivals that of the base layer blockchains themselves.
Complex coordination problems of this scale cannot be solved by any single entity. Instead, they require the power of free market innovation, where diverse participants can contribute their specialized knowledge and compete to deliver the best solutions. Just as no single provider can solve every blockchain's unique challenges, no single oracle provider can possess all the expertise needed to bring the world's data on-chain.
eOracle introduces a fundamental shift: separating oracle services into distinct layers:
The security layer (eOracle) handles infrastructure and cryptographic guarantees
The data layer (OVS) enables specialists to focus purely on their domain expertise
This separation represents the natural evolution of a maturing market - where different participants can specialize and perfect their part of the solution, resulting in better outcomes for everyone.
The eOracle stack creates the foundation for a marketplace of oracle services where specialized knowledge can flourish and compete. Through this marketplace, the oracle problem will solve itself through the distributed efforts of countless builders and innovators, secured by Ethereum itself.
Choose your path in the eOracle ecosystem through three distinct roles:
Oracle Validated Services (OVS) enable domain experts to build specialized oracle solutions using eOracle's secure infrastructure.
ePrice is eOracle's flagship product, providing secure and reliable price feeds for decentralized applications. Built with robust security mechanisms and availability across all major networks, ePrice offers permissionless integration for any application requiring trusted price data.
Operators form the backbone of eOracle's decentralized network, validating data and maintaining network security. By staking ETH through , operators earn rewards while contributing to the ecosystem's security and reliability.
At its core, eOracle is an open infrastructure platform that empowers developers to build secure oracles backed by Ethereum's battle-tested security model. eOracle creates a foundation for specialized data services that combine deep domain expertise with unmatched cryptoeconomic security.
Smart contracts are powerful tools for executing transparent, immutable logic. However, to reach their full potential, they need reliable access to real-world data. Oracles serve as the critical bridge between blockchain systems and external data sources, enabling smart contracts to interact with the world beyond their native blockchain.
Trust minimization is achieved through a decentralized network of 100+ staked-backed operators, an immutable data layer, and a coordination system allowing different unrelated entities to take part and contribute while putting stakes at risk through an infrastructure that is designed to maintain trusted, reliable data operation for decentralized data machines.
The eOracle stack provides a comprehensive platform that anyone can use to build specialized oracle services without permission or gatekeeping. Domain experts can leverage our infrastructure to deliver high-quality data solutions for their specific use cases, focusing on what they do best. With eOracle handling the complex security and coordination challenges, builders can freely innovate within their expertise – whether it's financial data, real-world events, or computational services – and deploy their solutions immediately.
This open architecture creates a vibrant marketplace where specialized oracle services thrive through competition and innovation. The ecosystem benefits from a rich diversity of secure data solutions, each optimized for specific use cases while maintaining rigorous security standards. This permissionless approach unlocks Web3's true potential by giving users and applications access to an ever-expanding landscape of secure, specialized data services – all protected by Ethereum-grade security.
The setup phase involves registering as an OVS and specifying prerequisites for operators who wish to participate in the OVS.
OVS registration on eOracle chain - Include registration as an OVS and define data feeds and sources. The relevant contracts to be deployed are described in eOracle Chain contracts
Setting operators requirements - Specify prerequisites for operators to participate on OVS, including:
Stake - Amount and type of tokens operators must hold → OVS native tokens can serve as a prerequisite, requiring a matching strategy on eigen . For more details: https://github.com/Layr-Labs/eigenlayer-contracts/tree/dev
Reputation requirements based on operator activity history
Software, runtime environment, and technology prerequisites
eOracle supports both permissionless operator registration (where operators join the OVS quorum upon meeting predefined criteria) and manual approval by the OVS manager.
Key considerations
The Corruption-Analysis Model helps establish the minimum stake requirement by comparing the potential costs and benefits of corrupting the oracle. For a detailed explanation, please refer to Cryptoeconomic Security
Default settings can be applied for stake and reputation requirements, using restaked ETH and auto-approved eOracle operators
eOracle's infrastructure and components enable builders to design custom oracle solutions for their specific needs while avoiding the complexities of low-level implementation details.
Key features of the eOracle stack include:
Modular stake-backed operators - OVS builders can selectively configure a subset of eOracle EigenLayer validators to handle oracle tasks—ranging from fetching data from custom APIs, running specialized off-chain computations, to monitoring real-time events. Each validator’s service is secured by restaked ETH (through EigenLayer), EO tokens, or an OVS-native token, ensuring alignment and integrity through staking-based incentives.
Execution & Consensus Layer - eOracle's purpose-built blockchain manages decentralized oracle operations, from data aggregation to consensus achievement.
Modular and Programmable oracle platform - A comprehensive smart contract architecture creates a modular and programmable oracle platform that supports new oracle development. This design provides a programmable layer for operator management, diverse data types, and aggregation algorithms while integrating with off-chain components and eOracle chain.
Data aggregation library - Collection of audited contracts that provides reliable on-chain data aggregation for various use cases. Each algorithm addresses specific data scenarios and security requirements.
Immutable data layer - eOracle chain serves as a permanent, transparent record of all oracle-related activity. This enables:
Verifiability: anyone can independently confirm the origin and accuracy of data.
Incentive Mechanisms: Permanent logging of operator performance enables the implementation of incentive mechanisms, including slashing, rewards distribution, insurance, and other advanced strategies to ensure consistently high service quality.
cryptographic broadcaster - a distributed system designed to bridge aggregated data from the eOracle Chain to various target chains with high reliability, low latency, and cryptographic security.
eOracle Ecosystem - eOracle Chain serves as a fertile ground for collaboration between multiple oracle protocols. Different OVS solutions can integrate to provide richer, more comprehensive data services. For example, a risk analysis oracle and a price feed oracle can combine to offer lending protocols price rates accompanied by risk analysis.
OVS Management - An app enabling OVS builders to manage operators, fetch data, publish, and configure various parameters
This section covers the process of designing and building an OVS on eOracle. It outlines the essential components developers need to configure and develop during integration.
The OVS design and deployment process consists of four parts:
Set up - Register as an OVS on eOracle chain, specify operator prerequisites, and define data feeds and sources. Set-up
Off-chain Components - Develop the logic for the data validator to retrieve data and define the update format. Use the eOracle Wrapper to retrieve the OVS configuration from the eOracle chain, and publish Prometheus metrics to monitor the health of the off-chain component. Off-chain Computation
On-chain components - Design aggregation logic and incentive management related contracts including slashing, rewards distribution, and so on. On-chain Components
Target chains publishing - Configure eOracle broadcaster eOracle Cryptographic Broadcasterto establish update parameters, triggering conditions, and verification schemes Target Chains Publishing
The first step in the data processing flow is defining what off-chain data the oracle service needs to submit on-chain and implementing the appropriate operator code.
Define and implement data validators execution logic - Writing DV code to retrieve the required data. Data here refers broadly to any output from computations, including fetching information from APIs, querying databases (blockchains included), and calculating statistics on account balances.
Transaction format - Data validators must pack their computation results into a transaction structure before sending them to eOracle chain. Data reports may include additional data such as timestamps, proof of computation etc. Transaction are signed using either BLS or ECDSA.
Sending transaction to eOracle chain - The eOracle chain is EVM-compatible, supporting the standard transaction formats used by common libraries like ethers.js and web3.js.
After the data validator code is established, The eOracle Wrapper facilitates interaction with the eOracle chain:
Retrieving OVS configuration, including update notifications
Sending reports to the eOracle chain with minimal latency
Publishing Prometheus metrics to monitor the off-chain component's health
Key considerations
Data validators typically run identical logic. This redundancy achieves decentralization and ensures that malicious behaviors can be easily validated on-chain. However, this replication creates coordination challenges. Data validator task should be easily scaled to run among all OVS operators.
In certain scenarios, computation integrity evidence can be recorded on-chain to verify the actions of data validators. This process helps in validating data accuracy and quality.
Purpose
This document provides a comprehensive explanation of eOracle's smart contract infrastructure design. This design aims to create a modular and programmable oracle platform capable of supporting the development of new oracles. This designs aims to provide a programmable layer that consists of operators management, different data types and aggregation methods.
Scope
This design document covers the architecture and implementation details of the smart contracts that will form the core of eOracle chain contracts. It takes into account the offchain components which are communicating with the eOracle chain.
Building new OVSs requires many pieces of infrastructure, specialized for managing operators, aggregating decentralized data and providing it to consumers.
The new smart contract infrastructure aims to achieve the following:
Modularity: Create a system where different parts can be easily added, removed, or updated without affecting the whole system.
enable updating data feeds and data sources
enable registering/deploying new OVSs
enable registering/deploying new feeds
enable registering new aggregators
Scalability: Design the system to handle more data sources, data feeds, aggregation methods.
Customizable Oracle Services (OVS): Make it easy for partners to create and deploy their own custom oracle services according to specific needs
Enhanced Flexibility: Ensure the new system can easily manage the connection between data feeds/sources, feeds/OVS, feed/aggregators etc
The system is designed to enable the construction of new oracles, referred to as Oracle Validated Services (OVS). Each OVS operates with its own set of registered operators who participate in the data aggregation and consensus processes specific to that OVS. Operators can request to join an OVS, and their participation is approved by the OVS Admin, who manages operator registration, data sources, and feeds within the OVS. The operators’ stake or voting power, registered to the eOracle network, is crucial for consensus on the data provided by each OVS. Every OVS contains feeds—data pipelines with input from one or more sources and an aggregator smart contract that processes the inputs to generate a single output. This output is distributed through the eOracle distribution system to target chains. The system’s modularity allows new oracles to be easily built by deploying a new OVS, configuring custom feeds, and allowing operators to opt-in for data updates, creating a scalable, customizable solution for diverse oracle use cases.
This section will describe the core components of the system:
Data Feed Management Module: Handles the configuration and management of data feeds.
Operator Management Module: Manages operator registration, activation, and stake.
Aggregation Engines: Combines data from different operators to create a unified result.
OVS Module: Allows partners to build and customize their oracle services.
Diagram
As an OPERATORS_MANAGER:
activate operators and manage operators configuration
setStake()
Activate Operators
Add Operators to OVS
manage aliases
changeAlias()
assignAlias()
As an OVS_MANAGER:
register OVS
register aggregator
approve OVS
approve aggregator
As FEED_MANAGER:
add/remove/update data sources
track feed id and store basic feed info - Ovs and Aggregator
As an OVS Admin:
grant/revoke other roles within smart contract
deposit rewards
approve/decline operators requests to opt-in to OVS
add feeds to OVS (saved to aggregator)
As an operator:
register/deregister from eOracle AVS
register/deregister to OVS
join to OVS
declareAlias to each OVS
updateFeedReport
Anyone:
request register new Aggregator
request register new OVS
Operator - OVS
each operator can be registered to many OVS
each OVS can have many operators
OVS - Aggregator
each OVS can support many aggregators
each Aggregator can be used in several OVS as separate instance
OVS - Feed
each OVS can contain many feeds
feed is related to one OVS only
Feed - Source
feed can be fetched from several sources
sources can be used by several feeds
actors
OVS_MANAGER
operator
guest
storage
interfaces
Responsibilities: separate contract responsible for feeds tracking and sources management
Interactions: can contain most of the storage which is used by other components
storage
interface
Interface
The on-chain components consist of aggregation logic and incentive management related mechanisms.
Aggregation logic- Teams must define the proper method for aggregating validator reports into a single oracle update. Considerations include resistance to manipulation, performance, simplicity, and more. Methods vary significantly for different data types and use cases.
For an exhaustive explanation of robust aggregation and the eOracle aggregation library, please refer to
Incentives mechanism- Define metrics for data quality and implement tools to evaluate operator performance. Based on these metrics, rewards and penalties are distributed through smart contracts. For an exhaustive elaboration on incentives design please refer to
This section provides a comprehensive overview of eOracle's smart contract infrastructure. Our design creates a modular and programmable platform that supports new oracle development through flexible operator management, diverse data types, and customizable aggregation methods.
Prior to examining the OVS framework and architecture, we present an high level overview of the data processing flow through eOracle-chain.
The data processing consists of 3 stages:
Data validators obtain data from sources using WebSockets, APIs, or perform some general off-chain computations. They sign this data and send it as a transaction to the eOracle-chain.
Chain validator nodes receive the signed reports, verify the reporter's identity, and aggregate the verified reports using dedicated schemes. This computational aggregation process and its result become an immutable part of the eOracle-chain.
eOracle Cryptographic broadcaster bridges data feeds from the eOracle-chain to various target chains. This involves monitoring eOracle-chain events in real-time, validating feed data against predefined criteria, signing data, and submitting verified feed updates to target chains.
All of the above actors are stake-backed eOracle\eigen’s operators.
The following sections describe how builders can use and configure eOracle's features to meet their OVS needs
Configure eOracle broadcaster to set target chain update parameters, triggering conditions, and verification schemes.
Target chain updating -Teams should establish their publishing requirements according to their data reporting needs and specific use cases.
Deciding on exact data to be delivered
Setting triggering parameters
Chain-specific batching strategies and optimizations
Data consumption interface - eOracle implements Chainlink's , enabling seamless transitions between oracle providers. See for details on consuming data from eOracle.
Verification scheme - eOracle broadcaster supports BLS, ECDSA and additional cryptographic techniques supporting bridging data cross-chain and proving integrity. While the canonical flow of the broadcaster is recommended, different use-cases may require different solutions on the perfomance-security tradoff curve.
Key considerations
Performance-Security Tradeoff Analysis for Optimized Verification Per Use Case
Gas minimization through appropriate data compression
End users experience
For more information, see
eOracle contracts on the target chain: managing publication, verification, and data usage.
EOFeedManager: The entry point for submitting feeds to the target chain, holding the latest feeds eOracle has published to the chain.
EOFeed Verifier: Used by the feed manager to verify the integrity of the payload and the signatures of the witnesses who signed it.
EOFeedAdapter: This smart contract exposes an interface identical to Chainlink contracts (the industry standard of having dedicated contracts per feed) from our client's side. Adaptation is needed because while our novel batching method reduces costs, all feeds are managed by the feed manager.
The Aggregation Library is a collection of smart contracts that provides reliable on-chain data aggregation for various use cases. Each method addresses specific data scenarios to maintain accuracy and integrity in decentralized environments.
Considerations for choosing the proper aggregation:
Time-variance. Since time is continuous, fetchers access the source at slightly different times. We don’t expect the time differences to be significant; more particularly, the time differences should not exceed one second, which is the rate of our blockchain i\o.
Simplicity. It is crucial due to runtime considerations and explaining to users how our mechanism works (KISS/Occam’s razor).
(Honest) mistakes. Although we have incentive mechanisms to punish/reward fetchers’ behavior, mistakes are unavoidable. For instance, downtime, latency, etc. These can happen even if fetchers are honest and thus should be accounted for.
Malicious behavior. Our solution should be as robust as possible to attacks. Namely, it should minimize the consequences of an attack and facilitate punishing attackers.
For detailed explanations, please refer to
For some shor example for aggregation methods please refer to
The median algorithm returns the middle value from a sorted list of validator reports. It is most naturally used for numerical data but can be applied to any ordered set of data.
A possible variant is the weighted median - Let be the stake of data validator , and assume that . Also, for simplicity, assume that are sorted. The weighted median is an element such that
Resistant to extreme values and outliers, as they only affect the tails of the sorted list—ignores the impact of anomalous data points due to its reliance on central values.
The aggregation value will always be between the honest reports, assuming a majority of the stake belongs to honest validators (weighted median)
May not reflect the influence of large/small prices if they are outliers
Non-incremental - the aggregated value cannot be updated upon each report in an online manner (as opposed to mean, for example, which supports where
is the mean after reports and is the -th report).
For more detailed information, please refer to
Role
Contract
Responsibilities
OVS_MANAGER
Registry (OVS module)
register/deploy OVSs, rigister/approve aggregators
FEED_MANAGER
Config
sources should be managed in Registry globally
OVS_ADMIN (OVS Admin)
OVS
admin, owner of OVS instance contract, manages other roles through AccessControl
OVS_PAUSER (for now it is OVS_ADMIN)
OVS
pause OVS
OVS_OPERATOR (for now it is OVS_ADMIN)
OVS
Approve Operators, add new feeds/sources to the OVS.
Prices are susceptible to noise and volatility. Therefore, financial applications often average prices over time. Well-known methods include Moving Average, Exponential Smoothing, Time-weighted Average Price (TWAP), and Volume-weighted Average Price (VWAP)
TWAP (Time-Weighted Average Price) - calculates an average value over a specified time period, weighting each data point by the duration or frequency of updates.
TWAP is calculated as follows:
where is the value of the at the -th measurement and is the change in time since the previous measurement.
Reduces the impact of rapid fluctuations in the data by spreading them out over time.
Incorporates time factors, making the final output reflective of trends rather than single-point events.
Offers smoother price data for algorithmic trading and liquidity management.
Less appropriate sensitive to fast market shifts or abrupt changes -smoothing over time makes TWAP less responsive than other algorithms.
Requires additional storage of the historic data.
Groups identical/similar data points together and at the end of each aggregation window outputs the value corresponding to the heaviest cluster assuming sufficient weight (x% of total validators stake)
Default parameters:
Aggregation window of one block
Sufficient stake is 67% of the total validators stake
Proper in cases where we expect the same result among all data validators . For example, fetching from a single and stable source or performing the same computation
Final result is strictly backed by most validators or stake weight (assuming 67% requirement)
Given a relative majority submitting accurate reports, iInaccurate reports do not affect final result (as deviant or malicious reports fall into smaller clusters)
Efficient online implementation and possible optimizations (Cleaning small clusters occasionally etc)
Storage inefficiency in worst case scenarios (ccurs when reports have high variance)
Limited effectiveness with volatile data—when values change rapidly, multiple small clusters form instead of a clear majority, making it difficult to reach consensus.
eOracle cryptographic Broadcaster responsible for data publishing to target chains.
Overview
The eOracle Broadcaster is a distributed system designed to bridge data feeds from the eOracle Chain to various target chains with high reliability, low latency, and cryptographic security.
The broadcaster's multilayer architecture enables flexibility and dynamism in handling data report formats, verification schemes, and update triggering logic.
System Architecture
The system consists of four main components that work together through message queues and a shared state database:
Witnesses
Aggregators
Processors
Publishers
Witnesses
Witnesses monitor the eOracle Chain for specific events and cryptographically attest to their validity.
Key responsibilities:
Monitor eOracle Chain events in real-time
Validate feed data against predefined criteria
Generate Merkle trees for efficient data verification
Sign data using both BLS and ECDSA signatures
Submit signed attestations to the aggregators
The witness component ensures that each feed update is independently verified and signed by multiple parties.
Aggregators
Aggregators process witness signatures and combine them when sufficient voting power is achieved. They implement a stake-weighted consensus mechanism based on witness voting power.
Key responsibilities:
Threshold-based sealing
BLS and ECDSA signature aggregation
Distributed coordination
aggregators achieve distributed coordination through the state database and capable for horizontal scaling.
Processors
Processors handle sealed aggregations and prepare them for target chain distribution. They maintain the latest state of feeds and generate proofs for target chain verification.
Key responsibilities:
Verify aggregated signatures
Maintain latest feed values in the state database
Generate and store Merkle proofs
Route updates to appropriate target chains and schedules.
Implement feed routing logic based on target chain configurations
Publishers
Publishers handle the final submission of verified feed updates to target chains, implementing chain-specific optimizations and transaction management to ensure proper delivery, the one and only task of the publisher is to get the package delivered, no altering, or other logic and without opening the package.
Key features:
Dynamic gas price optimization
Transaction retry logic
Chain-specific batching strategies
The eOracle stack is production-ready, with a phased approach to permissionless building. eOracle's flagship product ePRICE, focused on price feeds, is operational alongside EtherOracle, the peg-securing oracle.
Established companies are building on eOracle to decentralize their existing products, while new teams leverage our stack to build from day one. Both benefit from focusing on their domain expertise without compromising on security and infrastructure design.
The potential for OVS spans across blockchain innovation. From zkTLS oracles validating encrypted web data to prediction market dispute mechanisms, any decentralized consensus-based process can be built using the eOracle stack.
Let's explore the current projects building on eOracle.
need to fix math notation
Slashing refers to penalizing protocol participants who deviate from protocol rules by removing a portion of their staked assets. This mechanism is unique to PoS protocols, as it requires the blockchain to enforce such penalties.
On-chain subjective slashing refers to penalizing nodes for faults that cannot be attributed to validators based solely on on-chain evidence or protocol rules. In oracle networks, faults are typically of the form of submitting inaccurate data in an attempt to manipulate the oracle.
A key challenge in implementing robust slashing is the risk of nodes getting slashed due to honest mistakes. This concern is amplified in the subjective case, since determining whether a fault occurred is debatable — beyond just determining if it was committed maliciously or honestly.
Therefore, a prerequisite to slashing is the ability to detect misreports reliably and qualitatively. We outline different considerations for designing such a mechanism. We then need to establish appropriate penalty policies completing the detect and deter mechanism.
We propose a minimal, stylized mathematical model to analyze how the slashing mechanism should be designed. We abstract away some details for both simplicity and generality, making the analysis relevant to a general data oracle rather than a specific type. The concrete example of price reports is kept in mind and given special attention throughout the document.
More specifically, we aim to achieve the following:
Establish a common framework of terminology and concepts to enhance communication within the company
Derive basic principles and guidelines for an optimal solution.
Better articulate considerations, limitations, and inherent trade-offs, and suggest several options along different points on the trade-off curve.
Lastly, we note that implementation details are out of scope.
First, we outline the goals we want detection and penalties to achieve in a non-formal way. We deliberately avoid formalizing the desired properties at this point, instead stating general objectives to keep in mind.
Discourage misreports. Requires the ability to detect faults and penalize appropriately to deter initial misconduct.
Avoid penalizing honest mistakes. Necessitates the ability to differentiate between honest errors and malicious actions.
Avoid discouraging risk-taking: The penalty system should not discourage participants from reporting abrupt and sharp changes in data values.
Discourage uninformed voting. Examples of uninformed voting strategies include following the majority vote or consistently reporting the last aggregated result.
Prevent correlated attacks. As defined and described below
These objectives establish the foundation for developing effective detection and penalty mechanisms. Let us now examine our model.
We introduce a model that is as general as possible, leaving the data domain, aggregation method, and metric unspecified. Here is the basic setup:
The protocol consist of data fetchers , submiting reports in rounds (for example every block). Let be the report of player at round , and assume the reports belong to the domain . We use two special characters and to denote non-reports and out-of-domain reports, respectively. Namely, we denote if and only if player did not report at time , and assume without loss of generality that in case . In each round all reports are aggregated to a single value by an aggregation function . The aggregated value is denoted by .
After each round, we compute two functions:
Detection function: . Where corresponds to an honest report' correspond to a fraud and is the history, consisting of all past reports and past decisions.
Penalty function : , corresponds to the amount of stake to be slashed from player .
By "non-verifiable truth," we mean that the value validators report on cannot be objectively verified, either because it is inherently unknowable or because the protocol cannot access it.
We refer to various methods and approaches to identify fraud as filters. These filters have different properties:
Type of proof: What information does the filter require - can it be applied using only on-chain data? What strength of evidence does this filter provide?
Cost: This includes expenses such as gas consumption for on-chain computation.
Execution time
Precision and recall: Different filters are located at different spots on the precision-recall tradeoff curve and, in particular, have different tendencies for false positives and false negatives.
We now describe and analyze different types of filters. We classify them into three classes: Logical Conditions, Statistical Tools, and Filters Based on Human Judgment.
Defined conditions that can be automatically checked and enforced. These should be determined within the protocol setup phase and updated periodically. Examples are:
Logic&Physics: Methods involve studying the underlying function and identifying major deviations.
. Submissions outside of domain.
. Reports distanced from the protocol result. Note this result is not known to validator on submission.
. Reports distanced from the last protocol result (known to validator upon submission)
. Reports distanced from the last report of the validator.
Robust against a malicious majority (coordinated attack).
Does not account for the lazy strategy of submitting the same response without gathering information on the actual value.
May discourage reporting on a sudden change in value.
Preliminary analysis of the specific data of interest - a comprehensive domain analysis should be conducted to determine and define:
Defining the domain of valid reports and being able to determine if a report falls within this domain (compute predicate )
Provide a metric function
Specify resonable changes of the function of value per time to determine .
Social: Evaluating a report relative to other reports in the same round. Most naturally is relative to the aggregation result: . We can also consider comparison to other function of . Does not defend against a malicious majority (coordinated attack).
More options to what value we compare when deciding on .
Compared to other reports .
Compared to the validator past reports .
Compared to the aggregation result. This is not the same as (1) because aggregation also takes into account validator stakes.
Compared to where are weights derived from validator stake. This is a generalization of (3).
Advanced statistical methods such as anomaly detection, comparing data against known fraud indicators or patterns, and machine learning algorithms that learn from historical fraud data to predict or identify fraudulent behavior. In more details different filters in this class include:
Anomaly Detection: Using statistical models to identify unusual behavior that deviates from the norm, indicating potential fraud.
Pattern Recognition: Analyzes historical data to identify patterns associated with fraudulent activities, helping to predict and detect similar attempts in the future.
Reinforcement Learning: Employs algorithms that learn from data over time to improve the detection of fraudulent transactions automatically.
Rule-based Systems: Applies a set of predefined rules based on known fraud scenarios to detect fraud. These systems are often used in conjunction with other methods to enhance detection capabilities.
This method can be used to evaluate validators' long-range performance (discussed below) and trigger an alarm before an incident occurs.
Human oversight and judgment serve as an additional verification layer. For example:
Committee Voting: A committee of validators or stakeholders can vote to resolve disputes and identify faults. Ideally, the committee is a large, external, and impartial jury committed to participating in informed voting.
Random Validator Selection: A randomly selected validator is used to validate suspicious reports. This method is more affordable and faster than a full committee vote. The set from which the validator is chosen can be distinct from the protocol validators set.
Whistleblowing Mechanism: Any validator can submit a bond and raise a challenge against another validator.
Each filter in this class presents a mini mechanism design challenge of its own, as participants' incentives must be properly aligned to ensure the filter's effectiveness. For example, voters should be incentivized to vote according to their true beliefs.
Each validator receives a rating that reflects their overall protocol performance. This rating enables a reputation system that strengthens the slashing mechanism in two key ways:
First, it can be viewed as a statistical filter, serving as a tie-breaker in case of a dispute. For example, it supports more informed voting, thus enhancing a committee voting mechanism.
Second, it adds an additional penalizing dimension by allowing us to decrease a validator's rating instead of slashing their stake. This is especially helpful in cases of minor faults or faults that are not fully attributable or cannot be proven to be committed maliciously. That is, we can expand the model and denote by introducing . Penalty function is updated to reflect the fact that a penalty can be a reduce in reputation.
Reputation can be based on and measured by the following criteria:
Participation Rate: Measure the frequency and consistency of the validator's participation in protocol activities.
Report Accuracy: Evaluate how closely the validator's reports align with the aggregated results\ other reference.
Prediction of Abrupt Changes: Assess the validator's ability to predict sudden and significant changes in data values.
Trend Prediction Accuracy: Gauge the accuracy of the validator's predictions regarding long-term trends. For example let be two points in time where . We can check if during the interval validator reports where of an ascending nature (there are various methods to measure it, most naive one is the number of indices such that
Conformity to Expected Voting Distribution: Determine how closely the validator's votes match the expected distribution pattern. For example, assign each validator a vector where We expect . Additional statistical tests of greater complexity can be applied, but this demonstrates the core concept.
A reputation system can be used to relax actual stake slashing. Alternatively, we can consider:
Decreasing profile rate. For certain faults, actual slashing occurs only if the validator rate falls below a specific threshold.
Decreasing effective stake. Define:
Through the use of effective stake rating decrease impacts rewards and future income from the protocol. We can decrease effective stake either directly (decreasing ) or indirectly by decreasing reputation.
Reducing rewards and future income from the protocol.
Revoke - Prohibiting from the Protocol
Denote the filter applied in level and returns the probability for a mis-report with . Assume filters . In this section we discuss different methods for combining different filteres into a robust mechanism.
Avoid expensive computation if possible.
Some filters serve as an alarm before the fact, and not only apply after the event has occurred.
Complementing and correlated filters. For example, an initial definition for correlation can be considering a couple correlated if .
Complementing means both of them alerting is strong evidence.
Correlated means that if one of them is on, it is less surprising that the other one is also on.
Example for taking correlation into account: If then or was (w.h.p) manipulated and is not reliable. In this case, should be compared to an alternative aggregated value . In any case, in such scenario conditions should be altered.
Levels are ordered based on cost, execution time, and "type of proof". The ideal proof is logical and the last resort involves matching with off-chain information
We suggest a chain-filter mechanism, modeled after the multilevel court structure. This involves applying a sequence of filters, starting with cost-effective, quick filters, and moving to more expensive ones if needed. At each step, we either make a definitive decision or advance to the next level. To prevent "honest slashing," we prioritize precision at each stage. If a situation is unclear, we turn to more robust, costly methods to classify a report as fraudulent.
Formally, at every step we compute a function . If the result is either 0 or 1 to the report is considered honest or fraud respectively and the detection process is over. means we could not reach a decision and we continue to compute. level functions satisfies:
Meaning that once a definite decision is reached inside a level, we conclude if the report is fraud or not. Note:
We only convict nodes along the way.
This is a general design and different data may require different filters and ordering
We can apply filters in a “surprise inspection” manner
In addition to deciding where to position ourselves on the precision-recall curve, we need to outline the relationships between different levels. Considerations include the keys by which the levels are sorted - type of proof provided, cost, and execution time.
We assign each player a number which represents the probability that the player report is a fraud. That is, “definitely a fraud” corresponds to and “definitely not a fraud” corresponds to . This number could be the output of an AI algorithm, as mentioned above.
A natural rule for deciding on who reported false information is a threshold rule: we decide on a threshold and determine that reports with are considered as frauds. The threshold can be adjusted to fit the system's specific requirements.
Different layers contain multiple filters, each connected by an 'and' relation, while the relationship between layers can be either 'or' or 'veto.' A 'veto' condition is not necessarily positioned in the first layer due to considerations of cost and execution time; it may be used as a last resort because of these factors.
This framework proposes a comprehensive approach to on-chain subjective slashing in oracle networks, addressing the challenge of penalizing inaccurate data submissions while protecting honest validators. Key components include:
Multiple filtering layers combining automated detection (statistical models, pattern recognition) with human judgment mechanisms
A reputation system that provides an additional dimension for penalties and serves as a statistical filter
A chain-filter mechanism that progresses from cost-effective to more expensive verification methods
Flexible threshold rules and inter-level relationships that can be tuned based on specific system requirements
The framework aims to balance precision and recall while maintaining economic feasibility and execution efficiency.
Borsa Network is building a specialized Oracle Validation Service (OVS) on eOracle to bring sophisticated intent-solving capabilities to DeFi. Their system ensures efficient, fair execution of user intents through decentralized validation.
The protocol transforms DeFi intent solving through a three-stage process:
Intent Composition & Submission
Network-Level Processing & Bundling
On-chain Execution
Unlike traditional MEV-driven models, Borsa's case-agnostic approach prioritizes user outcomes while preventing exploitation.
Built on eOracle's infrastructure, Borsa's OVS implements:
Proof-of-stake validation for intent fulfillment
Optimization verification ensuring best execution
Full ERC-4337 compatibility for standardized processing
Leveraging eOracle enables Borsa to focus on intent solving while gaining:
Ethereum-based security through restaked ETH
Decentralized operator network
High-performance infrastructure for complex computations
This implementation demonstrates how specialized builders can leverage eOracle's infrastructure to create sophisticated, secure oracle services. Borsa's OVS represents a significant advancement in DeFi infrastructure, enabling more efficient and trustless operations.
This document analyzes how to aggregate multiple data reports into a single reliable estimate. We review aggregation methods and their properties, focusing on resistance to errors and manipulation.
When protocols encounter tasks that cannot be solved on-chain (oracle tasks) and require a decentralized solution, it's crucial to distinguish between two fundamentally different purposes of decentralization:
Decentralization for Better Results - When there's no single "right" answer, decentralizing the methodology itself improves outcomes. This applies to scenarios where different approaches provide complementary insights or where aggregating multiple viewpoints improves accuracy.
Decentralization for Security —When the task is well-defined but requires protection against manipulation or failure. This applies to operations requiring high reliability and fault tolerance where a single point of failure must be avoided.
The distinction between these purposes is fundamental: the first seeks to improve quality through diverse methodologies, while the second ensures integrity through distributed execution of a single, well-defined process.
This document analyzes how to aggregate multiple data reports into a single reliable estimate. We review aggregation methods and their properties, focusing on resistance to errors and manipulation, to find an optimal strategy balancing accuracy and efficiency. We place special emphasis on the weighted median since it is the most common aggregation method for price feed oracles.
We first consider a simple setting where data origins from a single-source.
Let be the relevant quantity at time , e.g., the BTC/USD price. Notice that is unknown. Instead, we can access an estimate from a known and agreed-upon source, for instance, interactive brokers. A set of fetchers fetch for us, where denotes the quantity reported by fetcher . The aggregate is the number we forward as our estimate of (and essentially ).
The question is how to aggregate into one number, , representing the price according to that source at time .
Time-variance. Since time is continuous, fetchers access the source at slightly different times. We don’t expect the time differences to be significant; more particularly, the time differences should not exceed one second, which is the rate of our blockchain i\o.
Simplicity. It is crucial due to runtime considerations and explaining to users how our mechanism works (KISS/Occam’s razor).
(Honest) mistakes. Although we have incentive mechanisms to punish/reward fetchers’ behavior, mistakes are unavoidable. For instance, downtime, latency, etc. These can happen even if fetchers are honest and thus should be accounted for.
Malicious behavior. Our solution should be as robust as possible to attacks. Namely, it should minimize the consequences of an attack and facilitate punishing attackers.
To quantify the last point, the Breakdown Point of an aggregate is the minimal ratio of reports by a malicious actor that allows it to achieve arbitrary deviation from .
We review below several options for our selection of an aggregation. All of them are special cases of minimizing an objective function. While there are infinite such functions, our analysis focuses only on median, average, and their trimmed counterparts.
Simple Average (Mean)
Pros: Easy to calculate; treats all reports equally; good for consistent data without outliers.
Cons: Can be skewed by outliers: its breakdown point is zero.
Weighted Average
Pros: Accounts for the varying significance of each report (e.g., based on stake); more accurate if reports are not equally reliable.
Cons: More complex to calculate, can still be skewed.
Median
Pros: Less affected by outliers than the mean; simple to understand and calculate.
Cons: May not reflect the influence of large/small prices if they are outliers.
Mode (most common value)
Pros: Represents the most frequently occurring price; useful in markets with standard pricing.
Cons: Vary widely or if there is no repeating price.
Trimmed Mean
Pros: Excludes outliers by trimming a specified percentage of the highest and lowest values before averaging; balances the influence of outliers.
Cons: Arbitrariness in deciding what percentage to trim; could exclude relevant data.
Quantile-based Aggregation
Pros: Can focus on a specific part of the distribution (e.g., median is the 50% quantile); useful for risk management strategies.
Cons: Not representative of the entire data set; can be as sensitive to outliers as the mean.
weighted median enjoys the robustness of the median and the ability to consider different significance levels as the weighted average. Its breakdown point is 50% of the weight; below that, an adversary can only manipulate the result within the range of correctly reported values (as we prove later on). The weighted median allows us to incorporate the stake of the different fetchers.
Mathematically, let be the (positive) stake of fetcher , and assume that . Also, for simplicity, assume that are sorted. The weighted median is an element such that
Therefore, our aggregate for such .
To demonstrate the robustness of the weighted median, we present the following theorem. It proves that as long as the majority of the stake belongs to honest fetchers, the aggregate will always be between the honest reports; namely, an attacker with a minority weight (stake) cannot shift the aggregate too much.
Theorem: Let be the set of honest fetchers, for such that , and let be the set of malicious fetchers, for such that \sum_{i\in M}w^i < \frac{1}{2}$ and $H\cup M=[N].
Then, the weighted median aggregate always satisfies
Recall that in the reasonable case we do not expect high variance among (honest) reports; thus, the interval will be small. This ensures that our aggregate is robust to manipulations.
Recall that prices are susceptible to noise and volatility. Therefore, financial applications often average prices over time. Well-known methods include Moving Average, Exponential Smoothing, Time-weighted Average Price (TWAP), and Volume-weighted Average Price (VWAP).
Our current service does not implement such time averages. We allow our customers the flexibility of the computation at their end.
We are now facing a similar problem, but now each quantity is given by a source (and not a fetcher). We have a set of sources , where each source has a price . Along the different prices we have additional weight per source. Weights capture our confidence in that source, volume, liquidity, etc. The weight-adjusted price is given by
There are several ways by which we can set the weights.
Volume-Weighted Average Price (VWAP):
Description: VWAP is calculated by taking the dollar amount of all trading periods and dividing it by the total trading volume for the current day. In your case, it involves weighting each source's rate by its volume, giving more influence to sources with higher trading volumes.
Advantages: Reflects more liquidity and is a common benchmark used by traders. It gives a fair reflection of market conditions over the given period.
Disadvantages: More susceptible to volume spikes, which can distort the average price.
Liquidity-Adjusted Weighting:
Description: Here, the rate from each source is weighted based on its liquidity. This method requires a clear definition and measurement of liquidity, which can include factors like bid-ask spread, market depth, and the speed of price recovery after a trade.
Advantages: Provides a more realistic view of the market by acknowledging that more liquid markets better reflect the true market price.
Disadvantages: Liquidity can be harder to measure accurately and may vary quickly, making it challenging to maintain an accurate aggregate price in real-time.
This document explores single-source price aggregation in oracle systems, covering both result improvement and security aspects of decentralization. It analyzes various aggregation methods, focusing on weighted median for its manipulation resistance and stake-based weighting capabilities, while also examining time-based averaging and multi-source aggregation approaches.
The document highlights breakdown points in aggregation methods, demonstrates weighted median's security when honest fetchers hold majority stake, and evaluates trade-offs between different aggregation strategies.
In a world where social signals drive markets and shape digital communities, bringing verified social data on-chain unlocks new horizons for web3 applications.
Social data isn't just about likes and follower counts. Understanding social influence requires deep analysis of engagement patterns, network effects, and temporal dynamics. Echo begins with X , parsing through complex social signals to deliver verified, meaningful insights about social impact and reach.
Echo starts by solving the immediate challenge of bringing verified X engagement metrics on-chain. But this is just the beginning. Our architecture is designed to expand across all social platforms, creating a comprehensive social oracle that can capture and verify social signals wherever they emerge. Through standardized data models and flexible validation frameworks, Echo enables progressive integration of new social platforms and metrics.
Echo's infrastructure processes social data through multiple layers:
Raw Data Collection: Direct API integration with X, capturing real-time engagement metrics and network analysis
Verification Layer: Cross-reference multiple data sources to ensure accuracy and detect manipulation attempts
Pattern Analysis: Advanced algorithms to identify genuine engagement versus artificial inflation
Network Effect Calculation: Measuring true reach and impact across social graphs
Echo leverages eOracle's infrastructure and Ethereum security through EigenLayer to ensure reliable, tamper-proof social data delivery.
Echo's first deployment focuses on X engagement metrics crucial for web3 communities:
Real-time monitoring of specified accounts
Engagement analysis (likes, retweets, replies)
Reach calculation and virality tracking
Community growth patterns
Network influence scoring
While Echo begins with X metrics, its implications reach across the entire web3 ecosystem:
DAO governance enhanced by social signal integration
DeFi protocols incorporating social sentiment
NFT valuations informed by creator engagement
Community platforms with on-chain social reputation
Marketing campaigns with verifiable impact metrics
Powered by eOracle infrastructure and secured by Ethereum through EigenLayer
When billions in liquid staking assets depend on accurate reward calculation, centralized oracles become an unacceptable risk.
Liquid staking protocols have revolutionized ETH staking, but they've introduced new challenges. When millions of users depend on accurate reward distribution and token rebasing, the oracle that powers these calculations becomes critically important. This isn't just about price feeds – it's about complex validator performance analysis, reward accrual verification, and secure rebasing execution.
Rebasing in liquid staking protocols orchestrates a delicate balance between staked ETH and liquid tokens. When validators accumulate rewards over time, the protocol must precisely calculate these earnings and adjust token supply accordingly. This process demands real-time monitoring of thousands of validators, precise reward calculations, and immediate detection of critical events like slashing or exits. Even a minor calculation error could cascade through the entire DeFi ecosystem, potentially leading to protocol insolvency or unwarranted liquidations. The complexity of this task, combined with the magnitude of assets at stake, demands a solution far beyond traditional oracle capabilities.
EtherOracle leverages eOracle's infrastructure to create a robust, decentralized validation system:
Multi-Source Data Collection
Beacon chain API integration
Ethereum execution layer monitoring
Smart contract state analysis
Validator performance tracking
Distributed Computation
Independent reward calculations
APR verification
Validator state monitoring
Withdrawal request processing
Consensus Mechanism
Hash-based report verification
Quorum-driven agreement
Multiple integrity checks
Secure mainnet execution
EtherOracle's role extends far beyond the immediate needs of liquid staking protocols. While it directly serves protocols managing validator sets and distributing rewards, its accuracy ripples through the entire DeFi ecosystem. When a user stakes their ETH, they trust the rebasing mechanism to fairly distribute their rewards. When lending protocols accept liquid staking tokens as collateral, they rely on accurate rebasing to maintain proper risk parameters. Even AVS protocols building on EigenLayer depend on precise liquid restaking token balances to ensure their security guarantees. EtherOracle thus becomes a critical infrastructure piece, securing not just individual protocols but the interconnected fabric of DeFi itself.
Learn more about Etherfi and Liquid Restaking - https://www.ether.fi/
A core feature of PoS protocols is the ability to implement transparent and objective rewards and penalties mechanisms. The objective is to incentivize data validators to maintain data quality and accuracy and discourage attempts to manipulate the oracle.
The fundamental prerequisites to enable a quality mechanism are:
Inaccurate data reports should be detectable
Honest mistakes and malicious manipulation attempts should be distinguishable
Faults should be objectively attributable (which is trivial in the canonical case where data validators sign their data reports)
Metrics on data quality should be defined
eOracle chain serves as a robust infrastructure to achieve these abilities as:
Operators are stake-backed
Data validators' past activity is transparent and recorded in an immutable manner
Prepared on-chain components to support rewards distribution and slashing
For a fundamental analysis of oracle cryptoeconomic security and key considerations behind slashing in a subjective environment, please refer to:
Price feeds make or break DeFi - too vital to run on promises alone. ePRICE represents a fundamental shift in price feed design, built on the core principles of restaking and cryptoeconomic security. Where traditional solutions rely on reputation and centralized trust, ePRICE ensures reliability through transparent architecture and Ethereum-based security guarantees.
DeFi protocols depend on price feeds as their source of truth, creating two fundamental challenges that ePRICE addresses head-on through innovative design and robust infrastructure.
The core challenge of price feeds lies in the fundamental nature of crypto markets: trading occurs simultaneously across multiple venues, prices vary between markets, and liquidity shifts continuously. At its heart, this creates a complex price discovery problem where market manipulation must be distinguished from legitimate price movements.
A robust price indexing model must maximize responsiveness to legitimate market-wide price movements while minimizing reactions to temporary or isolated price anomalies.
The ePRICE Approach: Our solution combines continuous data collection from multiple high-quality sources with sophisticated indexing algorithms that adapt to market behavior and liquidity changes in real-time. Each price feed is tailored through dedicated DeFi research, considering the unique characteristics and trading patterns of different assets. This market-aware approach ensures our price discovery remains accurate even as market dynamics evolve.
The most accurate price data becomes worthless if it can't be reliably delivered, especially during market stress periods when price feeds are most critical. A secure oracle infrastructure must maintain true decentralization while ensuring no single point of failure can compromise the system.
The ePRICE Approach: As the first oracle built on the eOracle Stack, ePRICE leverages a decentralized, modular system designed specifically for high-stakes data delivery. Our network of 130+ validators, backed by over $2M in restaked ETH, ensures data integrity through real-time performance tracking and sophisticated outlier detection. Each price update flows through a transparent process where operators submit signed data to our proof-of-stake chain, achieving consensus before being cryptographically broadcast to target chains.
ePRICE combines battle-tested infrastructure with sophisticated price discovery to deliver a new standard in oracle security and reliability. Built on Ethereum's security through restaking, our solution offers permissionless integration for any protocol requiring trusted price data.
By Bitpulse, in collaboration with eOracle
As DeFi protocols embrace innovations like Bitcoin staking and restaking, the ecosystem is unlocking billions in liquidity. However, these assets introduce unprecedented complexity in risk management. Traditional risk assessment frameworks were not designed for these new primitives, leaving lending protocols struggling to effectively scale and manage their collateral.
Pulse is the first specialized risk intelligence layer for synthetic assets. Built by Bitpulse in partnership with eOracle, Pulse delivers real-time, multidimensional risk assessments that enable protocols to make informed decisions about synthetic assets in real-time.
Pulse helps the DeFi ecosystem prosper by democratizing risk:
For lending protocols: Confidently underwrite collateral.
For investors: Deploy capital into better-managed markets.
For the DeFi ecosystem: Establish industry standards for synthetic asset risk assessment.
Comprehensive synthetic asset risk analysis using multidimensional scores across protocol, counterparty, liquidity, and market risk.
Real-time monitoring and risk alerts
Cross-protocol exposure analysis to detect cascading risks across interconnected assets and protocols.
Stress-Test Simulations to analyze resilience during black swan events like Luna or FTX collapses.
Integrate with Pulse to:
Understand whether a synthetic asset should be accepted as collateral given your risk profile
Make dynamic lending decisions based on real-time risk metrics
Protect against complex failure modes in synthetic assets
Adjust parameters based on sophisticated risk analysis
Access institutional-grade risk assessment tools
Developed by Bitpulse and eOracle, combining deep expertise in:
Asset risk analysis
Machine learning for financial systems
DeFi protocol architecture
Building scalable risk and data platforms in banks like Anchorage Digtial and giant tech giants like YouTube
Price feeds are a crucial component in the decentralized finance (DeFi) ecosystem, allowing for a wide range of financial activities such as lending, borrowing, trading, and derivatives. Price feeds enable dapps to access accurate and updated pricing data in a secure and trustless manner.
eOracle price feeds aggregate information from many different data source and are published on-chain for easy consumption by dApps. This guide shows you how to read and use eOracle price feeds using Solidity.
Reading eOracle price feeds on EVM-compatible blockchains follows a consistent format for both queries and responses across different chains.
eOracle follows Chainlink's , allowing a smooth transition between oracle providers.
You have a basic understanding of .
An interface named IEOFeedAdapter
defines several functions for accessing data from an external source.
These functions include retrieving the decimals, description, and version of the data feed, as well as fetching round data and the latest round data.
The constructor initializes a public variable named _feedAdapter
, which is of type IEOFeedAdapter
. It sets _feedAdapter
to connect to a specific EOFeedAdapter
contract deployed on the Holesky network at address 0xDD8387185C9e0a173702fc4a3285FA576141A9cd
. This adapter is designated for the BTC
feed.
The getPrice()
function retrieves the latest price data from the _feedAdapter
by calling the latestRoundData()
function. It returns the answer, which represents the latest price of the BTC
feed.
The usePrice()
function internally calls getPrice()
to fetch the latest price , illustrating how the price could be parsed and used.
At eOracle, we've implemented a comprehensive categorization system for our data feeds. This system is designed to inform users about the intended use cases of each feed and highlight potential market integrity risks associated with data quality. Our goal is to provide you with the information needed to make informed decisions when integrating eOracle feeds into your applications.
It's important to note that all feeds published in eOracle's documentation undergo rigorous monitoring and maintenance, adhering to the same high standards of quality. Each feed is subject to a thorough assessment process during implementation. The specific assessment criteria may vary depending on the type of feed being deployed and may evolve over time as our understanding of market integrity risks deepens.
We group our data feeds into the following categories, ranked from lowest to highest level of market integrity risk:
✅ Low Market Risk
🟡 Medium Market Risk
⭕ High Market Risk
⚙ Custom Feeds
🔭
This categorization serves as a guide to help you understand the relative risk profile of each feed. However, we encourage users to conduct their own due diligence and risk assessment when integrating any data feed into their smart contracts or applications.
By providing this transparent categorization, eOracle aims to empower developers and projects with the knowledge they need to build robust, risk-aware decentralized applications. Remember, the appropriate use of a feed depends on your specific use case and risk tolerance.
Key Risk Factors by Market Integrity Risk
Custom Feeds are designed for specific purposes and may not be appropriate for general usage or align with your risk parameters. It's essential for users to examine the feed's characteristics to ensure they match their intended application.
Custom feeds fall into these categories:
Onchain single source feeds: Utilize data from one onchain source, with only one provider currently supporting the feed.
Onchain Proof of Reserve Feeds: Employ a large, diverse group of vetted node operators to obtain and confirm onchain reserve data.
Exchange Rate Feeds: Access exchange rates from external onchain contracts for token conversions. eOracle doesn't own or manage these contracts.
Total Value Locked Feeds: Assess the total value locked in particular protocols.
Custom Index Feeds: Calculate values based on multiple underlying assets using predetermined formulas.
Offchain Proof of Reserve Feeds: Verify offchain reserves through custodian attestations.
LP Token Feeds: Combine decentralized feeds with calculations to value liquidity pool tokens.
Wrapped Calculated Feeds: Specific feeds that are pegged 1:1 to underlying assets, but may deviate from market price given that the price is a derivative formed from a calculated method.
When integrating price data for an asset into your smart contract, ensure the asset maintains adequate market liquidity to prevent price manipulation. Low-liquidity assets can experience high volatility, potentially harming your application and users. Unscrupulous actors may exploit volatility or low trading periods to manipulate smart contract execution.
Some feeds source data from single exchanges rather than aggregated services. These are identified in the feed's documentation. Evaluate the specific exchange's liquidity and reliability.
Liquidity migrations, where tokens move between providers (e.g., DEX to CEX), can temporarily deplete the original pool's liquidity, increasing manipulation risk. If planning a migration, collaborate with stakeholders (liquidity providers, exchanges, oracle operators, data providers, users) to maintain accurate pricing throughout.
Low-liquidity assets may show price oscillations between points at regular intervals, especially when data providers show unusual price spreads. To manage this risk, continuously assess the asset's liquidity quality. Low-liquidity assets may also experience erratic price movements from incorrect trades.
Develop and test your contracts to manage price spikes and implement protective measures. For instance, create tests simulating various oracle responses.
Certain data providers rely on a single source, which may be unavoidable when only one source exists, either onchain or offchain, for specific data types. It's crucial to thoroughly evaluate these providers to ensure they deliver reliable, high-quality data for your smart contracts. Be aware that any errors or omissions in the provider's data could adversely affect your application and its users. Careful assessment of single-source providers is essential to mitigate potential risks associated with data inaccuracies or inconsistencies.
Price data quality can be affected by actions taken by crypto and blockchain project teams. These "crypto actions" are akin to corporate actions but specific to the crypto sphere. They include token renaming, swaps, redenominations, splits, reverse splits, network upgrades, and other migrations initiated by project teams or governing communities. Maintaining data quality depends on data sources implementing necessary adjustments for these actions. For instance, a token upgrade resulting in migration may require a new Data Feed to ensure accurate price reporting. Similarly, blockchain forks or network upgrades might necessitate new Data Feeds for data continuity and quality. Projects considering token migrations, forks, network upgrades, or other crypto actions should proactively engage relevant stakeholders to maintain accurate asset price reporting throughout the process.
Data Feed performance is dependent on the blockchain networks they operate on. During times of high network congestion or downtime, the frequency of eOracle Data Feeds may be affected. It's recommended that you design your applications to detect and appropriately respond to such chain performance or reliability issues. Implementing measures to handle these network fluctuations can help maintain the stability and accuracy of your data-dependent applications.
Assets with significant presence on decentralized exchanges (DEXs) face unique market structure risks. Market integrity may be compromised by flash loan attacks, volume shifts between exchanges, or temporary price manipulation by well-funded actors. DEX trades can also experience slippage due to liquidity migrations and trade size. The impact of high-slippage trades on market prices depends on the asset's trading patterns. Assets with multiple DEX pools, healthy volumes, and consistent trading across various time frames generally have lower risk of deviant trades affecting aggregated prices.
When evaluating a eOracle Data Feed for backed or bridged assets (e.g., WBTC), users should weigh the pros and cons of using a feed specifically for the wrapped asset versus one for the underlying asset.
Decisions should be made individually, considering:
Liquidity
Market depth
Trading volatility of the underlying asset compared to its derivative
Users must also assess the security mechanism maintaining the peg between the wrapped asset and its underlying counterpart. Regularly review these factors as asset dynamics evolve over time.
eOracle Data Feeds are designed to report market-wide prices of assets using aggregated prices from various exchanges. For backed or bridged assets, these feeds continue to report the underlying asset's price in addition to the wrapped token's price. This approach reduces manipulation risks associated with the typically lower liquidity of wrapped tokens.
However, users should be aware that extreme events, such as cross-chain bridge exploits or hacks, may cause significant price deviations between wrapped assets and their underlying counterparts. For instance, a bridge hack could lead to a collapse in demand for a particular wrapped asset.
To mitigate risks during such scenarios, users should implement safeguards in their applications. Circuit breakers, which can be created using eOracle Automation, are recommended to proactively pause functionality when unexpected scenarios are detected in data feeds.
Additionally, consider using eOracle Proof of Reserve for real-time monitoring of wrapped asset reserves. This enables protocols to ensure proper collateralization by comparing the wrapped token's supply against the Proof of Reserve feed.
Exchange rate feeds differ fundamentally from standard market rate eOracle Price Feeds in their architecture and purpose.
Market rate feeds provide price updates based on aggregated prices from multiple sources, including centralized and decentralized exchanges. This approach offers a comprehensive view of an asset's market-wide price.
In contrast, exchange rate feeds are specific to particular protocols or ecosystems. They report internal redemption rates for assets within that ecosystem, sourcing data directly from designated smart contracts on a source chain and relaying it to a destination chain.
Exchange rate feeds are particularly useful for:
Pricing yield-bearing assets by combining the exchange rate with the underlying asset's market rate
Enhancing liquidity pool performance for yield-bearing assets by enabling programmatic adjustments to swap curves
It's crucial to note that both feed types have distinct risk profiles and mitigation strategies, which vary based on asset type and liquidity. Users are responsible for selecting the appropriate feed for their needs.
Try ECHO beta Version on Camp Network testnet -
We're actively partnering with lending protocols to validate and refine our risk assessment framework. If you're building or operating a lending protocol interested in safely expanding into synthetic assets, we'd love to collaborate -> ,
Contact for more details on deployments and usage.
Market Events
Highly resilient to disruption
Ongoing market events (e.g., token migrations)
Significant market events (e.g., hacks, bridge failures, major exchange delistings)
Price Feeds Stability
Use numerous data sources
The price spread between trading venues
Asset/project market deprecation
Trading Volume
Consistent price discovery due to high volumes across many markets
Low/inconsistent volume causing liquidity issues and price volatility
Extremely low trading volumes
Centralization
X
Concentrated trading on a just few exchange
Concentrated trading on a single exchange
Data Inconsistency
X
x
High spread between data providers
BTC/USD
0x10Cd3Ee16501d7b754311107555AFE1eBd38CC1e
18
ETH/USD
0x0022087BD6fdcb4133203a078FcEC79D95e23f9b
18
sFRAX/FRAX
0x7488C5447CaCBAa1EC4Dc1E87a75E97a6bCA4bE7
18
sfrxETH/frxETH
0xd3cC37fbb038e365D607c3DbeA3C6fB2Bcf34424
18
WBTC/USD
0xcbb0e9BE7CBC677437B7BD0B63751b06dBe50ccF
8
ETH/USD
0x2d3bBa5e0A9Fd8EAa45Dcf71A2389b7C12005b1f
8
TBTC/USD
0x513E0666D5F1Da6ED728295DAA43d9a4C1b8152D
8
USDC/USD
0x8f016Ce412F264E9ada4B1791a20e1de36efF6BF
8
BTC/USD
0xcCc99923F3EeC7ec876C71Be12175147b1259e07
8
DAI/USD
0x5d13071D87bf42148E307bE75AbfD780Cbd34298
8
ETH/USD
0xF6A7287F94Bd4f89A24fa9f145FA7128814Eb42B
8
USDC/USD
0x7ac466392A435e42E9CE9668e622D406C7A65E45
8
USDT/USD
0x3Ee2aa2a278c7F0A7f34320399685754a482d3aD
8
sFRAX/FRAX
0x413a4b7b6157764a208Cc2d8FbFfa9394A27df0a
8
sfrxETH/frxETH
0xcf317996b304EfaB1eBc98a076bb4F5843104e23
8
HONEY/USD
0x1fC1bA7EA4Ab1231fE48651B36b6940b0AD3856A
8
WBERA/USD
0xc847f826194dac0bB946564C3aAdcc6777c5ecFF
8
iBGT/USD
0x437ce738092Ec107D1cc0D2f690dA731BA9C5EB7
8
STONE/USD
0x8f935E0722114B758AA16Dd8F34D4690fFC4ffd1
8
USDe/USD
0x76Cc1Eee7ad5946046CFF6843F8c2bfbf9e7A0B6
8
SolvBTC/USD
0x5C39e8C922A587dd9Be8C42A6bc4e6f5142B8241
8
uniBTC/USD
0x95181Bed6DFAa487F56b2Fd9C32e0a7E10baf20c
8
BTC/USD
0xA2b185439079CaA3C68d3E33440b364dde8d599E
8
ETH/USD
0x75DfcbeDF377f99898535AeE7Fa1Cd1D1e8E41b0
8
EUR/USD
0x051A4b85a51DE75E7ef393a839791131Da58e0cB
8
LINK/USD
0x1D70359e53C422BE7111131BECE7B8B09Bf127Ca
8
SOL/USD
0x429666bcea8ce629d8742d1d38cC6Ba58f28c317
8
USDC/USD
0x4ba73879B0C073Db595aBE9Ba27104D83f024286
8
USDT/USD
0xF8D5334492b0139CEdAB7f6b55Ab9Bd9763E82a1
8
ezETH/USD
0xb1E7Db061e58Fa039c5C38a7f96e9476c2cfC78a
8
sFRAX/FRAX
0x55d8997f4eEd70CFbcE472b8D35aE2a8Dc0C956F
18
sfrxETH/frxETH
0x859DdD1A56C4C9B782E979530245B22040f34F5e
18
stETH/ETH
0x7A1Fae7a43DCd7979B2b65E4445c6EDd32EF351D
18
weETH/USD
0x15a3694998DDb14815536B8a5F74130CA8f5236A
8
wstETH/USD
0xDB5d5dE97eD9125283ADa3560FE4f11e996041ab
8
ynETH/ETH
0xD2E957EB37B3d96E258d118d25A4c33AA26310ba
18
WBTC/USD
0x31FEeac9552a6215BD23Bd8c590B34BF04d865AE
8
ETH/USD
0xd68AeF8Ab6D86CeC502e08Faa376297d836FdfA6
8
TBTC/USD
0x58f6c92b7160f2E93B25EfCC95d0D4a23c15F3c0
8
USDC/USD
0x399A965083E512011c82AAEB6A86036463010C95
8
Explorer:
RPC:
ChainList:
BERA/USD
0x5fa10236F04f687f547881B5D87CB4d5F5ca987A
8
HONEY/USD
0xec4C6e6163DA3AFC051286a5007fd300C1f10759
8
NECT/USD
0x6e21a42Ac7DA737Ae25Ad27eFf34CAC053BEa4b9
8
BTC/USD
0x5aB00478D7aD92DF0396AF1B7C1303237D402cb8
8
ETH/USD
0x5aB00478D7aD92DF0396AF1B7C1303237D402cb8
8
USDC/USD
0x5aB00478D7aD92DF0396AF1B7C1303237D402cb8
8
USDT/USD
0x5aB00478D7aD92DF0396AF1B7C1303237D402cb8
8
SolvBTC/USD
0xD52a08f095210290cF3b6b589D7EaD06fb92A40a
8
STONE/ETH
0x89F92912B11bc1b4F7fB0Ee37CEa2179b08750a7
18
STONE/USD
0x664b3560f82023c3985aa052dad3dcd6755FE93c
8
weETH/USD
0xaA7c43C84608Ae3247e5Ea342A6B0b9E7aE9b732
8
pumpBTC/USD
0x6B52f35a69fCEFed99322D22AD529A1B4Da5877f
8
SolvBTC.BBN/USD
0x803B3E4582d107F097155A13AF7329dF5B8a43bA
8
rsETH/USD
0x5842326e40BF7bCDB688e7F06DE7A7A3bA6fE211
8
rswETH/ETH
0xD681F0d6500eE63a57d415ad48DC374DDDddCE63
18
uniBTC/USD
0x64eB3a92f29843ad759111417bF1dA0Ae9073278
8
eBTC/BTC
0xA521354Ab99351804FbF284fF2F72AF3e19D9077
8
USDe/USD
0x9F726E40871af40531394784555E0c452E9D3E07
8
BTC/USD
0x77afF4a805f5Ab69224b2b0Bc7B0303f4Fb6A274
18
DAI/USD
0x5bEa865590122ED96119B51507D9Ed144d8d04E8
18
ETH/USD
0x3d59629dC4583ff0C2E78E612c111d557cEE17E9
18
USDC/USD
0x2d3833D8758E158E7a2B6536dDB32a1AB0e07F2e
18
USDT/USD
0xb8eA10AB070E22C978DeE2Cb2Df019373Bbd4F33
18
BTC/USD
0x177749BEacaD7b7009d28DeFEfe2324aD0fa13d0
8
ETH/USD
0x7dbC7C4d2Caa5d79120BF602Da22846253efc0cd
8
USDC/USD
0x70ACaf762dBA25B2751b8F6F9e492D17813d2AdA
8
USDT/USD
0x05A2EC8062D1335bB792b86596632dD2DF93C97C
8
SolvBTC/USD
0xDB1D69104361905C76dfEf39d2B43d4Cbb4199C7
8
WBTC/USD
0xcFd160510b5a7912Ee593f8711429b23C71ca947
8
LBTC/USD
0xa59f06579BFAF27B2038131b6209A911e173003c
8
BTCB/USD
0xC3740C3c49EdA37298F8e6C5970D53b9C2498F2b
8
BSTONE/USD
0x288B754d41F00EEa76676dd39845EC5D233b4c88
8
BTC/USD
0xD42EB475373d39964BFb4BCB80434CF292198714
8
ETH/USD
0x5880F039Df4a07ec4D70427A0589E8F5A2d84873
8
FDUSD/USD
0xCA21C7409680167C064719Bb228EEFf23a51EF3E
8
M-BTC/USD
0x289eed05AB904bcD1d4966c6AA11a476c4be7B4f
8
SolvBTCm/USD
0x455ee1630208a9DB90A4EDE5e638d3B2a9B56245
8
USDC/USD
0x938709683Aa5c155593986Dc03ca20D51aE5709c
8
USDT/USD
0x4eC877ae8B868219FfE7748D48a12C9A9c7c26bC
8
AVAX/USD
0x864fa871a0e753927EA85cd4997a9e5393943827
8
BNB/USD
0x051Dd27C9562463d4C30F05c7daE2384B5e0a5cE
8
BTC/USD
0x34c20800d472f50D5Ed5848e82CBd63488554A29
8
ETH/USD
0x50E0566971212ac4eA8c583aEC59a5d22bd3355b
8
FTM/USD
0xe2C31c2e0A4608C1eA37441AaeAA4E9b5A0a526F
8
MATIC/USD
0x05007061Db2eC39ED6fEA79cd2123d6c0C6F4225
8
ETH/USD
0xDe7738E662ba22060F3Dd29e9eBcF82c07612b9f
8
SOV/USD
0xCa1551Da0e1a2ed90719f2f40cAAF845b9969ee9
8
High risk: Liquidity is low across all markets. Consider carefully before integrating.
STONE/USD
0x3f9912F835aC43F9dF3075b7F4ABb1806Dd9EbCf
8
USDCe/USD
0x55cda607A9405f0db1edA11d15766890b50D73Df
8
USDT/USD
0x61E136B228a5D6F4a0533232899CCC589117C9dF
8
WBTC/USD
0x361548D8BCda9bF808B0DEbE487078911Bf37966
8
tBTC/USD
0xE2c790c016958497Edce620c17782aCF76c3CEd5
8
wstETH/USD
0x07138D66E2d01d93519Ef814D7262e9a787Ad067
8
Compatible with AggregatorV3Interface.
AVAX/USD
0x7729a521eA9950b893C3605593002571955daCce
8
BBTC/USD
0xCEA0CBD56529aba05E7045C05A03f601750627F8
8
BBUSD/USD
0xE78737fA1F3e074b4919b73aBbC9c5805f50930A
8
BNB/USD
0xFb19b6D3a754af67823Ac09ab3B5E6d1D75A4494
8
DAI/USD
0x76B7e38e6661f87b02f0b00Cad7823672B4171C0
8
ETH/USD
0x58B375D4A5ddAa7df7C54FE5A6A4B7024747fBE3
8
FTM/USD
0xc3eb7FD1d2c243003678d5a24d48c9dDB0C78580
8
M-BTC/USD
0xdd0002c4d2F4e2c6Ad31fa2505e93406d79c6893
8
STONE/USD
0x07283aa99ed48Fa2F6B4a7e80De2191b4E0D898b
8
SolvBTC/USD
0x1B4F9d3DBDC2911bEC74D831d9D3632b0a9d5f19
8
SolvBTCb/USD
0xa1862F8366E12dE4C5C843007B9d6F7717289b74
8
SolvBTCm/USD
0x4d6eAfe018dD26C13f34a7e3954168134A0AFF4f
8
USDC/USD
0x6E4cda6DfFAB6b72682Bf1693c32ed75074905D9
8
USDT/USD
0x71BEf769d87249D61Edd31941A6BB7257d4bAE5F
8
WBTC/USD
0xdEd5C17969220990de62cd1894BcDf49dC28583E
8
ezETH/USD
0x1C19C36926D353fD5889F0FD9e2a72570196B4EC
8
uniETH/USD
0xADb511136B591e0d484889ECe1087e6bA5a175c7
8
weETH/ETH
0xA0a8c2c8e506a92DE06D0815d6b0B8042e246BB4
18
weETH/USD
0xb71B0D0Bf654D360E5CD5B39E8bbD7CEE9970E09
8
wrsETH/USD
0xE6690E91d399e9f522374399412EbE04DA991315
8
wstETH/USD
0xB37568E6d24715E0C97e345C328f208dDbF8A7A9
8
Explorer: https://lineascan.build
ChainList: https://chainlist.org/chain/59144
Compatible with AggregatorV3Interface.
ADA/USD
0x249fBbdC1c8754167C5c932E3F6A590EA1AF6489
18
APT/USD
0xc3d96CB3C9881cfEa21764e3B83E4fe44e569bC8
18
ATOM/USD
0x41a444E301E8D1B313e483FB824eE33ebF4BC897
18
AUD/USD
0xeDaB68959c36B2282d39d6F76cF6C2D64ceAe85D
18
AVAX/USD
0x00ef968030C168b8153375DdE8402888103561F8
18
BCH/USD
0x37aCaB555682457b61E9CE199dBbc04f0aBaF1fD
18
BNB/USD
0xc3786f6918c374702e7c55650faA733ff1049f32
18
BTC/USD
0xDD8387185C9e0a173702fc4a3285FA576141A9cd
18
DAI/USD
0x20362533A154a614F0aa6a1924B686Ed13a9CA30
18
DOGE/USD
0x33b102E341fF55CefB86BaDdfcD44fde02fA43D1
18
DOT/USD
0x12bFFe83E77a5661CdB57B8172cb00665b7E2cf9
18
EOS/USD
0x0b8726f974AdaC471617f8d30E56763550136B14
18
ETH/USD
0xadE0B2B50939fE630eFc6bF2A2a43D4Aeea482Cc
18
ETHx/ETH
0x71056A9FBf5d2E4d9c151bc15305f768Ad70f0e8
18
EUR/USD
0x68bd25BcA5b45e6d9705854e151d56DCFF65C44C
18
FIL/USD
0x0b72481F81b5aaFF416EF80718E164D40a95494a
18
FTM/ETH
0xdC3e23428872F343bb4175769A874D7Baf8643e3
18
GBP/USD
0xBdBb634dAD7a89eB496C55699B9aE1f26A4D28A1
18
ICP/USD
0x2A9D1c20f10Ab32079c16a261Aad56dc403F8125
18
JPY/USD
0x2c37Cab88f426021f81C1367D01B1d4dA3514158
18
KAS/USD
0xa06f1978a85Eb0Ef8a6c3Bd9c2B58eD270Ad8825
18
LDO/USD
0xAa7ECB00A8D5171Db73ed050c2055974EF9C4696
18
LEO/USD
0xAa95F2f53CFaf795DcdA68df1b5Ab4dB1EfE8eb6
18
LINK/USD
0xF6979d9805cA5b5fc9087870536C985652c66d51
18
LTC/USD
0x204016FE142a44e9fac7d790fc7c9498fc4A1Fb1
18
MATIC/USD
0x4FF1367B34bDC3139b2939F450124C63eb2A4ab7
18
NEAR/USD
0x24a820676386B918373fD30fcB49Bdf2A671b8D9
18
NEO/USD
0x650D1c01740523BBc39DC019D09B97C6ad3Dae9d
18
OP/USD
0x0375304a96fD25EcAc66f0529C3c81045CCa1dA6
18
SHIB/USD
0x5901A14B0A5c0601c9c8E764d3930DaF3A258e2a
18
SOL/USD
0x45795b7B27EC9519E3Af1b8E6e754D9492FcfCe7
18
STONE/ETH
0x3C9083c69AB0c1D81A3c398231029211aD79Ee08
18
STX/USD
0x0dFE0dd9d514633f4349a0b5C0087adf6e406167
18
TON/USD
0xeA171339DD7B0E30F4416CeC341eB7dF5dC6d7F5
18
TRX/USD
0xccD0dF7Be3c9A72f1ff2656488AD2a42b489d9fd
18
UNI/USD
0xE04E9c1B6f675f0fEf4e04334CC77301Aac219Be
18
USDC/USD
0x81738cD8763A9Ba8D110723fF2C4555fD13aa713
18
USDT/USD
0x38A8007A9Bd9e345E03ccE08D6AC81d3E7d9F15D
18
XRP/USD
0xA2D6Def55c1dFA59840499A82d319740d148c3bf
18
ankerETH/ETH
0xe1Dd09a9e3D20754ae223e307f200D5bD0dB48C4
18
cbETH/ETH
0x8c2164fba99F87A6fF65E3C46565aBbb905eE025
18
eBTC/BTC
0xc79e9a5955557Aa83b96a173d4c9E765E132F4Bf
8
ezETH/ETH
0x6B6266024B8b20E5131Dc6a805506150Bd71995f
18
lsETH/ETH
0x851fCE1C5970E8Cbd5A62d434ac5FE1626f82D6E
18
mETH/ETH
0x5D03FB0cbE3D96A660E0E4091E4F048076a19f7C
18
oETH/ETH
0xef54aba1bd2222a8784F1d820327aA104b144783
18
osETH/ETH
0x1cD4F4154e03dEbB521e47000ad80499eEDc04A6
18
pufETH/ETH
0x4842fC3014b642c33cF992D1CE83E1Be3865D610
18
rETH/ETH
0x68AbdF83c12e5Bad8d0FeC5ed7Adb746356a8077
18
rsETH/ETH
0x993604eDDc97383554870cCBC2306155a2b6AE4E
18
rswETH/ETH
0x509145e618dB152659d29474E214417397703F7F
18
sFRAX/FRAX
0x43fDf973fA09B73D4EaF158f3C3ad7eB7a83743b
18
sfrxETH/frxETH
0xc038C30324d90d70D31D88dF134D0A8B6FFdb775
18
stETH/ETH
0xa3C243a7Ec02b800BaC6839B03a1C46FCf06c61e
18
swBTC/BTC
0xD53d582d7de7B5E43F81199aA1bf177cEf52c4b5
8
swETH/ETH
0x9D6dae537A5211f973f414b1ca7BFABB1DFa1B7b
18
uniETH/ETH
0xad373843db0f8B3226d162Cbd39cB7e2b44Ec67e
18
wBETH/ETH
0x0E07EA967f8eB7553805f77B919211B5ced8c661
18
weETH/ETH
0x9307063480aC3e3930fDFe64a7abA9E0DC5c4192
18
weETHs/ETH
0x3785302200D1fAAE21e7bAdD676e41ebB2f16f5D
18
ynETH/ETH
0xFCe7588c12Cd7D3fF1880872143e602B9EdaA1dF
18
Explorer: https://holesky.beaconcha.in
ChainList: https://chainlist.org/chain/17000
Compatible with AggregatorV3Interface.
USDC/USD
0xA5c24F2449891483f0923f0D9dC7694BDFe1bC86
8
ETH/USD
0x2D6261dce927D5c46f7f393a897887F19F3fDf2A
8
Explorer: https://sepolia.lineascan.build
ChainList: https://chainlist.org/chain/59141
Compatible with AggregatorV3Interface.
BTC/USD
0xc1a823069a4439f9A5C5008eA38346d587028D37
8
ETH/USD
0xdFc720E1ef024bfc768ed9E6F0e7Fc80E28f8CFA
8
USDC/USD
0xF1d7c07d6DAA1200a137ea1146E1f8c5D6Fc0223
8
USDT/USD
0xd37D8878ed854027CB3a71907b95677BB0477baf
8
Explorer: https://explorer.inkonchain.com/
ChainList: https://chainlist.org/chain/57073
Compatible with AggregatorV3Interface.
ETH/USD
0xf3035649cE73EDF8de7dD9B56f14910335819536
8
M-BTC/USD
0x47F8B9002761a6E145eead0d6d9b364a3977FACe
8
MODE/USD
0x8f9F198D8F643523aF982158570F196117BCb26D
8
STONE/USD
0xFb6EaC86eb27E00F63a86d081A3FD5277A50cFbb
8
USDC/USD
0x0f4554a3BD2107b8E0D8c7461acdf88891dc6eCA
8
USDT/USD
0xd8fe094eD59525882159420001f997a7e2538017
8
ezETH/USD
0x7Fb03712D8240f7D2Ec11207520119aCe26338A8
8
weETH/USD
0x4369125dFE684b811433976f7E8e036Fb7D87a6d
8
wrsETH/USD
0x2Df56438c50AE93303e7A2c188ec5F539ca365d3
8
uniBTC/USD
0x4EEB40C0379B8654db64966b2C7C6039486d4F9f
8
Explorer: https://explorer.mode.network
ChainList: https://chainlist.org/chain/34443
Compatible with AggregatorV3Interface.
BTC/USD
0xD4bc859E0de1bAc03A5b9Ffaf71393328EB1B274
8
ETH/USD
0x71bafCA6F2181C16173Dc3FAeF49090e687238D6
8
USDC/USD
0x5e2C566F9B8859fF42E78F7A9540efAb9Ae71DE1
8
USDT/USD
0x23552E6Ca60D94a519F66D4CF4A958049f98c652
8
Explorer: https://explorer-sepolia.inkonchain.com/
ChainList: https://chainlist.org/chain/763373
BTC/USD
0xa76A88e803D1653389453478B2C160f8E17f3545
8
ETH/USD
0x0E77399AE0A6E45Bbcf5dc4F9A1806Fc3228Ee80
8
sFRAX/FRAX
0xe4bCE7AC0CC10B6982dE13c9100BA41176313143
18
sfrxETH/frxETH
0x58135d84dD80306Bc4F6B32CE3dDD1A3fDC92A81
18
BTC/USD
0x59f659eC8e50453A27841cC1AE14f2c2c11B8Ca2
18
ETH/USD
0x9fd3E3121427E829c14321f8CD2Bdd6c63711CC2
18
sFRAX/FRAX
0xAEE07Ea15a16b4Ed24383a1DC7fFa75e01C21457
18
sfrxETH/frxETH
0x76F9f31E6823A066BFDa87ddCe15e8054d1614e2
18
BTC/USD
0xad43317bCb093CFb9792e95c54459815da8C33c6
8
ETH/USD
0x179ABDA20BE2f08478Ad1A48b793D3f07f995228
8
USDC/USD
0xf568fdc0b5e148dE374DB28443409517f50c0695
8
USDT/USD
0x5f1833C1415eaE12c135d2F3A8f21d542807d674
8
BTC/USD
0x21653aD2FEc37d87d3ff041fbfa5070CE6dd8fc2
18
ETH/USD
0x5e387cA04d4A52fbeCa458f0C0677184Cae212A1
18
sFRAX/FRAX
0x742a8DE9a639A509A8dC1eD818A42A0D84E3Ff9c
18
sfrxETH/frxETH
0x8Ec3f0Dc9662c018CACaEC9D4d3E93bf1545CFCE
18
BTC/USD
0x185170f20aAcf5A5cab70A76c79fD53767f14cd2
18
ETH/USD
0x748D8Aa7edc49E928f6D12A64AaFbb225cBa56fC
18
sFRAX/FRAX
0x6B2EDF51ea8c98A53594a74b3996c3A796F1D42f
18
sfrxETH/frxETH
0x968aa7F822934908F3FE645E372a5A587b9BcDbB
18
BTC/USD
0xd2c1C3F14ce879dC2291eF8bE18f94a9E51bE8dc
8
BGB/USD
0xe4F5c5096fbffc5acBa4BfDDC9A1defF5fe64bD2
8
DAI/USD
0x96addddd63bF609FEc59Ab2262B9a28bC38FD3eb
8
ETH/USD
0x383b30462016Ef2f29fa1ad923b6A5Aff0B8D964
8
USDC/USD
0xCA28E1ba3144f82Ba36B07AB3Bc015EC30B752e1
8
USDT/USD
0x09D11d74af6E203B2cdeB4D46A03C0b3a321AE55
8
USDe/USD
0xafAeb1A20e37c428cd1278E6a11391A366EfeF6B
8
WBTC/USD
0xE0B01ee041fb32e2131BE819C871A4d016c8807b
8
weETH/USD
0x71FC2D197704E8503Ccc77Bd11136bd2f80784b9
8
pumpBTC/USD
0x6E352284ACBe6eb67B8F31089e4fB2cC751733dc
8
eOracle contracts for Soneium chain
Compatible with AggregatorV3Interface.
BTC/USD
0x1164eCEF47c4EC31dd1a7D940fa4F6A784365c2d
8
ETH/USD
0x9e670fea8b61614BbE440A63EE565D257D04FDfE
8
USDC/USD
0x84B959d6813C25c7F5046F416b3c69eE49Ad2d36
8
USDT/USD
0x8059Bf59295678D959A15907A03086610207C61E
8
Explorer: https://soneium-minato.blockscout.com/
ChainList: https://chainlist.org/chain/1946
Compatible with AggregatorV3Interface.
AUD/USD
0xa5F728c64fb70968720378c09DF0DDCA7B246Da0
8
BTC/USD
0xc56fa2c48e243413a659c8fd16Fb047964ab7533
8
ETH/USD
0xbcC3a1e96921906818195bE54C2AA10D6bf8f119
8
EUR/USD
0x76c12F560F40cE66c9c614A87d02334CC3DD0Ee6
8
GBP/USD
0xcBfeD0de1b8F4Ce4ec0E24DcD275Dc360E36C461
8
LINK/USD
0x05c0B40A9795219C2287592054Ca1af1abC27D7b
8
LRC/USD
0xC6CE1273B5DB99241254A9837cABEE581F7Afd54
8
M-BTC/USD
0x055f3eb056426017d6Abcb7Da76B7b0894BA7376
8
SOL/USD
0xe5dE79C214D6784Aa301a0ED411117a97C090765
8
SolvBTC/USD
0xe3ffd520392E00485bc7720E65c71Ad48C71e9b3
8
SolvBTCBBN/USD
0x754EA144E4e8a28CFDc2c5d3a28154D440804728
8
TAIKO/USD
0x23F18D1e4Cf84458562bf62deC6f0Ec6Bcdf9450
8
USDC/USD
0xAB015cF1B4A6c8b561af20E11b651c26C97aB127
8
USDT/USD
0xf8e1fa123E7eb230EF6eB6225b64F773F4201049
8
ezETH/USD
0xC3953795f747E63720699ED6b58ec7e891B3EE48
8
sFRAX/FRAX
0x65E42a63aBd4e44845b124a7840538c7F66803F7
18
sfrxETH/frxETH
0x82C3f8582a122089d40B2F7ab5806FEF297dC3C7
18
stETH/ETH
0x3a6ce8D7A8b4cdE6F96a09e779F84e183901A746
18
uniBTC/USD
0xb497808d9322E0960e0100e2bA76f99953d05dCb
8
ynETH/ETH
0x6f6eFA2eEDE1C6d8C21f16638D1516Dd6Fb17346
18
Explorer: https://taikoscan.io
ChainList: https://chainlist.org/chain/167000
Compatible with AggregatorV3Interface.
BTC/USD
0xa09b2ac7eBACB1d419a37847711BCBF72B5B895d
8
ETH/USD
0x5d9693f51A96932cAd5605945D16Ebe1C1C4C1FE
8
USDT/USD
0xFf8dCA35B699833F5a3B44c93eaf677257E8D290
8
USDC/USD
0x8ec2130aDb958d60B2b2fCB7D8f009c0A9f844C9
8
Explorer: https://test-explorer.plumenetwork.xyz/
ChainList: https://chainlist.org/chain/98864
Compatible with AggregatorV3Interface.
AUD/USD
0x6C2E7fdA1C5bB93B9c10AF1c7f516DBE30cD82ab
18
BTC/USD
0x4A0aDea3d3f27475B52D3b0A201fd15702d9854E
18
ETH/USD
0x1Ee2487e186e4dcF2446A0E0dE21bf3F906303f2
18
EUR/USD
0x4DF9A79d7C5D80718609ECe741EfEc07B19479F0
18
GBP/USD
0xb1C902e9472019aF412BA9689D769a58916De9F8
18
LINK/USD
0x5AaabDc0685486b4421de719BceEAa8535a0D4cA
18
SOL/USD
0xe5852e821Ef80227aAe2736766bE4D2dE034A0F3
18
USDT/USD
0xe286EE8b802b46f3D1ab05929a7eEF3D9217F183
18
sFRAX/FRAX
0xc5Ed688e683fa876907A42d310b01297F43cf791
18
sfrxETH/frxETH
0xabd27A44C82da8feE2921c743C03f6776e78255a
18
stETH/ETH
0xd77C1B0E0E0EE7725cEca46fCca81636be8dCF2F
18
Explorer: https://blockscoutapi.hekla.taiko.xyz
ChainList: https://chainlist.org/chain/167009
eOracle contracts for Scroll chain
Compatible with AggregatorV3Interface.
ETH/USD
0xc8C1a9D869d85b70f1A6062D95d5F4D7dF7cb9Ae
8
STONE/USD
0x80275fF847E8Dcf8d27Fe8C40a89B5940D869991
8
SolvBTC/USD
0x7C77Ae8492ac6c50890d95d4b0ba3C42f78dD212
8
SolvBTCb/USD
0x243cBCB11C685B7ca88472ab3C6F2c587804Fc7d
8
SolvBTCm/USD
0x5DCcBfEDb4F8750774B5d3e079247d109cB89ec0
8
USDC/USD
0x78d613da0e7EE0dA0cF88676Bd3e48350fEc76D4
8
USDT/USD
0xD69be4CB41A05e3293f1Af3DF07C5f9D7F437FD9
8
USDe/USD
0x5E22Fccc027Dff8Ee45819576e7Ee0822955562c
8
WBTC/USD
0x7A7eeA8d6c68824144b685c1231617C34294C702
8
pufETH/USD
0xbE98CE9e43E7496aE92363974CD0ae7A608EC694
8
uniETH/USD
0x92978b69ED8fc5618FfA707868Fa730B687Fb898
8
weETH/USD
0xDE84731EBCfcAcAfB5F857392bcdC27d32A701d7
8
wrsETH/USD
0x08f5a540A48d1a91e97CaeA066dB90c9c63Bf6D9
8
wstETH/USD
0x5F86e1De3dCdb61ADE916c1BFC85F4E047e83588
8
Explorer: https://scrollscan.com
ChainList: https://chainlist.org/chain/534352
The service allows users to easily query for recent price updates via a REST API or via a websocket
A user could use this endpoint to query symbol price quotes via REST API.
Our REST API endpoints could be found at: https://api.eoracle.network
Endpoint: /api/v1/get_rate
Method: GET
Parameters:
symbol
(string, required): The symbol for which to get the rate.
Authentication The REST API authentication method uses a username and password. The username is the API key provided to you by eOracle, and the password should be left blank.
Endpoint: /api/v1/get_symbols
Method: GET
Example
Response
We provide a simple socket stream using the standard Socket.IO library. The message protocol is described in the following section and includes a connection, authentication and subscribe phases.
Connection is made to our eOracle api endpoint at https://api.testnet.eoracle.network. Once connected the consumer can initiate an authentication event.
Request Events
authenticate
name: authenticate
payload:
subscribe
name: subscribe
payload:
authenticated
This message is received when your client was successfully authenticated with a valid API key. Once you receive this it's a good trigger point for subscribing to quote feeds.
name: 'authenticated'
payload: none
quote
name: quote
payload:
eOracle contracts for Soneium chain
Compatible with AggregatorV3Interface.
BTC/USD
8
ETH/USD
8
USDC/USD
8
USDT/USD
8
Explorer: https://soneium.blockscout.com/
ChainList: https://chainlist.org/chain/1868
eOracle feeds are provided in <SYMBOL>/USD by default. If you need a different currency pair, you can calculate it using two existing data feeds. For instance, to get the BTC/ETH price, you can use the BTC/USD feed and the ETH/USD feed and calculate BTC/ETH by dividing the two.
Here is an example:
This page details how to configure an automated Gelato task to update price feeds regularly.
Gelato serves as the decentralized backend for web3, enabling developers to create enhanced smart contracts that are automated across all major EVM-compatible blockchains. Gelato offers Web3 Functions (W3F), which execute your smart contract's functions based on various triggers, on and off-chain.
Head to and connect your wallet.
For this guide, we will define a transaction to our consumer contract every three minutes.
Input the consumer contract address (must be verified on Etherscan for ABI fetching) and select the function you wish to automate.
Create the task and approve the transaction through your wallet.
After selecting the task, you can see the task activity.
For your convenience, please see the following resources if relevant for your use case:
Explorer:
RPC:
ChainList:
You can see the task by going to and selecting the task. Note you will have to fund the task with 1balance. You can acquire it at .
ARB/USD
0x19d9f02E3E8A74476A27661dedf5f78E499B8dF9
8
BBTC/USD
0x5fAfd80ceF6BFb8eBf9876077f2E6b9532170E4e
8
BBUSD/USD
0x6B60fce1DF3cD674F0ECC07D332cBd784e382ED8
8
BTC/USD
0xEC4e9989e6b8433fbc0b2A1D96CcC37A4c67FAB5
8
BTCT/USD
0x7746b87d278Eb295c34C56e6DBFeDDa136F00B41
8
ETH/USD
0xe28AEbAa3Ec11B0a4a5FaF69ef3e84D985DdE27c
8
M-BTC/USD
0x03Ff1A38ddD6Bad6338723b98b0f38daAdae4298
8
MANTA/USD
0x1603bA93278584778ACb61FD6E1e83A8745eA68d
8
STONE/USD
0xed4370303dED4b82e9B0F06Fd0BD0344E58c633e
8
SolvBTC/USD
0x37119C5Afa7A1f3E51919776B3DB3c9831F511Fb
8
SolvBTCm/USD
0xd18a24341a82d4Aa5f2e6f554093E2292Cd956C7
8
USDC/USD
0x258b3411bd7EE5cCFc431B6fb2a606febd9df1d0
8
USDT/USD
0x0c4516a820D22e790D495bEB7555c5edb65F1136
8
WBTC/USD
0xC9B6c0d45173C2FF5b87222281D2D9fd9a78CD7f
8
pufETH/USD
0x689D165052288297b8240f55059DAec51C3CA0F4
8
BTC/USD
0xCe29E11B4356a457152A076af260B7d3E24A3C64
8
ETH/USD
0xe8De783c5d10026065C471c4Fd726Ba314bf6228
8
USDC/USD
0xE2ecd64F48B3f6CeBFAc0c06e6C37B3FBCAB6cE2
8
USDT/USD
0x70611462a684974955E3e4DB51A32eEF3C27483D
8
BTC/USD
8
ETH/USD
8
USDC/USD
8
USDT/USD
8
BTC/USD
0xFC47427C87515d9699D06B2F5953D9881b1B4bf0
18
ETH/USD
0x3f1A68F44548a45D4B3245384f3DAA7309902B7D
18
STONE/ETH
0x566Ce3F0Cb5cA15708daD63B8A11BA2e87359E42
18
STONE/USD
0xDC623adE3F34275cfbDb9971ac1935d452f6A234
18
USDC/USD
0x6f4C98B2aa007cF396110C64b5Ad59ae04B3Dbe7
18
USDT/USD
0x72717F45F2ACF33C93C2736E5ef4b628232393C0
18
ETH/USD
8
STONE/USD
8
USDC/USD
8
USDT/USD
8
WBTC/USD
8
ZRC/USD
8
ezETH/USD
8
inwstETHs/wstETH
18
weETH/USD
8
wrsETH/USD
8
wstETH/USD
8
Integrating off-chain data into your workflow is essential for creating robust and dynamic decentralized applications. This section provides a detailed guide on how to access eOracle's API off-chain.
eOracle’s tokenomics revolve around cultivating a secure, scalable, and sustainable environment for specialized data services. By combining the EO token with restaked ETH, eOracle dramatically heightens the economic barriers to malicious activity while simultaneously rewarding honest participation. Initially, token emissions will encourage network growth, but over the long term, OVS fee revenue is poised to take center stage, tying reward distribution directly to real-world data demand.
Through governance powered by veEO, participants have direct influence over how revenues are allocated, how often rewards are adjusted, and which new use cases are supported. Meanwhile, specialized oracles—each focused on a particular domain—embody eOracle’s vision of a truly open marketplace for Web3 data and computation, with the EO token acting as the driving force behind security, governance, and economic alignment.
By uniting domain experts, data consumers, and validators under a cohesive economic model, eOracle is setting the stage for a new era of decentralized data infrastructure—one that is more inclusive, scalable, and specialized than ever before.
The EO token is the foundation of eOracle's security. Validators must stake EO, combined with restaked ETH (via EigenLayer), to participate in data validation or chain validation. This dual-staking model significantly raises the cost of attacks, creating a robust, multi-asset security foundation that deters malicious behavior.
To incentivize participation and ensure protocol integrity, validators earn rewards for accurate and reliable performance. Delegators can contribute to security by assigning their EO to trusted operators, sharing in the rewards while allowing specialists to manage the technical responsibilities.
Holding EO also offers a way to influence eOracle’s future. By locking tokens, participants receive vote-escrowed EO (veEO), which grants them on-chain voting power. veEO holders can propose or vote on matters such as updating protocol parameters, adjusting rates, or adopting new OVS features. The longer tokens are committed to locking, the greater the governance utility and reward boosts, creating a powerful alignment between protocol success and long-term token holding.
Token holders can choose to irreversibly convert their vesting schedule into a full token lockup. This voluntary conversion requires locking the tokens for a longer period than the remaining vesting duration. Once converted, holders can delegate these locked tokens to validators, enabling them to participate in network security via staking and receive veEO tokens with corresponding lock-duration boosts. While this option provides access to participate in eOracle validation and governance, the conversion decision is permanent and delegated tokens become subject to slashing risks based on their chosen validator's performance.
OVSs can accept payments in EO or any other token, but rewards to validators and treasury fee are distributed in EO (with non-EO payments being converted to EO for rewards). This creates a steady stream of usage for the token through validator rewards. Each new specialized oracle, whether it's a sports data feed or a cybersecurity engine, contributes to this demand as their validators earn EO rewards for providing on-chain data. This core reward mechanism strengthens EO's utility as the eOracle ecosystem grows.
In the future, the EO token will serve as the native gas token for the eOracle chain, becoming essential to the network's daily operations. This shift will strengthen the token's role in both transactions and governance, directly connecting its value to eOracle's network activity.
The following sections outline security aspects of the eOracle protocol
eOracle is a decentralized data layer that brings specialized off-chain information and computation on-chain through a robust, security-focused architecture. By leveraging Ethereum restaking, it empowers specialized oracle services called Oracle Validated Services (OVS), making the network both permissionless and accessible to domain experts.
Unlike traditional oracles that treat data feeds as one-size-fits-all, eOracle's approach acknowledges that different data sets - from finance and AI to eSports and cybersecurity - require deep domain expertise. This specialized model enables accurate, real-world data delivery to decentralized applications (dApps) while unlocking a range of tailored services that better suit modern on-chain needs.
The EO token is the cornerstone of this ecosystem, underpinning the network's security model, rewards system, and long-term participant alignment. eOracle uses a dual-staking mechanism that requires both EO and ETH, aligning incentives for all participants—Data Validators, Chain Validators, Broadcaster Validators, and Delegators—to maintain high standards of data accuracy.
The eOracle ecosystem is composed of several participant roles, each playing a unique part in securing data, facilitating services, and driving economic value:
Data Validators fetch and process off-chain data or computations. They earn fees for accurate reporting and face slashing penalties for misbehavior in their duties.
Chain Validators maintain consensus on the EO chain and aggregate validator data. They also earn fees for accurate reporting and face slashing penalties for misbehavior in their duties.
Broadcaster Validators publish validated oracle reports from the EO chain to external blockchains and L2s. They ensure reliable cross-chain data delivery with cryptographic verification.
Delegators delegate their EO tokens to validators to help secure the network. They share in validator earnings without operating nodes, but accept slashing risks if their chosen validators misbehave.
dApps & Protocols use eOracle's data and computation feeds in their applications which may span across DeFi, NFTs, insurance, and other sectors. They pay fees that sustain the network's economy.
Oracle Validated Services (OVSs) - OVSs are the specialized data or computation layers built on top of eOracle’s Stack. Each OVS caters to its own domain, such as cybersecurity, insurance, weather, or eSports. This specialization fosters higher-quality, more accurate and secure data streams and computational services for dApps.
eOracle mints EO tokens as rewards to incentivize early network adoption and bootstrap security. As the ecosystem grows and demand for specialized oracle services expands, these emissions gradually decrease to preserve token value and limit inflation.
OVS revenue primarily comes from user fees. A share of these fees goes to Data Validators, Chain Validators, and the network's treasury. veEO holders also receive a portion, aligning the interests of governance participants with the network's long-term success while rewarding their commitment. This model ensures that as OVS usage grows, so does the economic value shared among the key contributors to the OVS and network success.
One of eOracle’s core objectives is to create a self-sustaining environment. Rather than permanently relying on token emissions, the protocol seeks to anchor its economic model to fee-based revenue generated by OVS usage. As more dApps rely on specialized data from eOracle, the fees they pay will increasingly fund validator and delegator rewards. This shift not only reduces inflation but also ties the token’s value to genuine market demand for real-world data feeds.
To further stimulate adoption, eOracle introduces merit-based incentive programs. These programs reward early OVSs and dApps that integrate eOracle feeds, helping bootstrap usage during critical growth phases. These incentives foster a robust ecosystem of OVSs, validators, and dApps.
Allocation
The initial supply of EO is 10,000,000,000 tokens, with an inflationary mechanism for network rewards. The initial tokens are distributed across five key categories:
The table below explains the various categories of distribution and their vesting schedule -
The dual-staking approach combines restaked ETH with EO tokens, making malicious behavior substantially costlier. Any attack attempt would require an enormous upfront investment to gain sufficient influence over the network. Beyond this high barrier to entry, attackers also risk losing their entire stake through slashing penalties. With validators earning consistent rewards for honest participation, and facing severe penalties for misconduct, the economic incentives strongly favor maintaining integrity across the validator network.
Slashing penalties apply to validators or data providers that deliver incorrect data, go offline excessively, or demonstrate other forms of misconduct. Because actions are recorded on-chain, external audits and community-driven monitoring help ensure the detection of anomalies, thereby reinforcing trust in the system.
If you are unfamiliar with the concept of an oracle, reference the Ethereum Foundation's
As blockchain technology gains widespread adoption and the usage of its applications expands, the economic significance and security requirements of oracles must grow with it.
Ethereum's Proof of Stake has established the gold standard for economic security, trust minimization, and decentralized validation. Through EigenLayer's shared security, this proven model now extends beyond Ethereum's core consensus, enabling a new generation of oracle services that inherit the same security guarantees.
Access to the largest pool of staked funds
Staked ETH is orders of magnitudes larger than the staking of all other traditional oracles combined. An oracle network with access to staked ETH inherits the established security instead of creating another pool. This access provides a more economically secure and capital-efficient way to build oracle networks.
Native staking
eOracle's security backing, ETH, is independent of eOracle operations. This makes it robust against issues that other oracles who use their token for staking, such as temporal drops in token value and death spirals. , leading to security reduction and vice versa.
Slashing for malicious behavior
eOracle's system is designed to deter and address malicious activities. Utilizing , eOracle can initiate procedures that may lead to the slashing of an attacker's staked funds. Slashing completes eOracle's incentive model, matching Ethereum's security apparatus.
Distributed validation
Validators worldwide verify data accuracy, making the network robust against localized disruptions. This approach ensures that no single point of failure can compromise the system, enhancing both security and reliability. Additionally, the diverse geographic distribution of validators contributes to a more resilient and fault-tolerant network capable of withstanding various types of attacks and ensuring continuous neutrality and operations.
Economic and diverse Trust
Economic trust is the amount of capital at stake (quantity), while diverse trust is the variety and balance of nodes involved (quality).
For a protocol to achieve security and liveness in a decentralized manner, it needs a sufficient amount of economic trust and a diverse, well-balanced set of nodes. Only Ethereum has reached sufficient economic and diverse trust.
With restaking via Eigenlayer, an oracle design containing these elements is enabled, providing a practical path to achieving sufficient trust via diverse and economically trusted Ethereum validators.
If you are unfamiliar with the concept of an oracle, reference the Ethereum Foundation's
The following is a brief overview of the core components that define the eOracle protocol, to contextualize the data aggregation process.
Read more here:
eOracle Validator Sets are integrated into the Ethereum PoS Validator Set through the Aegis protocol, enabling Ethereum validators to participate freely in the eOracle network permissionlessly.
eOracle is an expansion chain that derives its cryptoeconomic security from Ethereum staking and benefits from the stability of ETH. Through innovative infrastructure provided by Eigenlayer, Ethereum Validators are able to participate in the eOracle blockchain as part of Validator Set
. Validators can initiate a withdrawal from the Validator Set
, and membership can be revoked for misbehavior, within Ethereum.
Naively implementing a new PoS protocol is not possible since the validators' stake is managed on Ethereum rather than directly by the protocol. To address this challenge, we developed Aegis—a novel protocol for creating an expansion chain based on primary-chain stake, in our case, restaked ETH. The eOracle blockchain is built on Aegis.
Aegis uses references from Aegis blocks to primary-chain blocks to define Validator Set
, checkpoints on the primary chain to perpetuate decisions, and resets on the primary chain to establish a new committee if the previous one becomes obsolete. It ensures safety at all times and rapid progress when latency among Aegis nodes is low.
eOracle operators connect, compute, validate, and publish off-chain data to Dapps securely, permissionlessly and transparently.
Any publicly accessible real-world data can be added to the eOracle network, where eOracle operators will begin reporting on it. Reports are sourced from different endpoints, such as a WebSocket or an API. The frequency of reporting and the values to be extracted are programmable by the user. Once the operator obtains the data, it signs it and sends it in a transaction to the EO-chain. Any operator with an above-threshold stake can participate in reporting, weighing each report by their stake. A report for a specific operator cannot be faked by another party, and their participation is an immutable part of the EO-chain state once received.
Dapps can use eOracle's standard aggregations, which employ advanced algorithms and protocols to identify and discard outliers, or custom aggregations defined for a specific use case. For consensus and security, the computation is distributed among the validators and verified by them.
The computational aggregation process and its result become an immutable part of the EO-chain. The decentralized, transparent, and permissionless nature of this process ascertains that the reports and the aggregation results are authentic, accurate, and verifiable. Those results are then eligible for publication.
Publication is the process of posting eOracle aggregated data onto a target blockchain. A target blockchain is any blockchain network where dapps wish to use eOracle data. To provide eOracle data, each target blockchain has a smart contract that verifies, parses, and approves data signed and produced by the EO-chain.
Dapps, individuals, and institutions can easily interface with eOracle in the smart contract layer by using the eOracle Solidity SDK and reading their required aggregated data on-chain.
Off-chain infrastructure can use our WebSocket interface to cache aggregated data and provide a smooth and low-latency user experience, enabling instant integration and execution available on user-facing services. Our low-latency interface makes on-chain security and transparency accessible to provide a seamless user experience.
Process Overview
Reporting is permissionless, transparent, and unfalsifiable.
Aggregation is decentralized, programmable, secure, modular, immutable, and easily verifiable.
Publishing is efficient, interoperable, permissionless, and censorship-resistant.
Consumption is dynamic, highly compatible, and a simplified user experience.
In summary, the eOracle platform enables users with customizable requirements, dynamic security needs, niche data dependencies, and more to define their data flow. By defining the data type, sources, aggregation logic, and other desired variables, users can programmatically and comprehensively satisfy all workflow requirements to provide data and computation on-chain.
Any party can interface with the eOracle network for a given data need, and retrieve the proof components, a BLS-signed Merkle root & Merkle path. This can be used to prove the validity of data cross-chain. The signed Merkle root component enables the verification of a valid eOracle Validator Set, while the Merkle path can then be used to prove the inclusion of aggregated data. Due to the transparent and verifiable nature of the process, users are always assured of the authenticity of the computation, operator participation, and staked security.
While traditional oracles rely on their proprietary tokens to maintain ecosystem health and secure operations, eOracle introduces a novel security approach with its dual-token design. The model synergizes the specific advantages of a protocol-dedicated token with the enhanced security and economic stability provided by a well-established token like ETH, used for staking purposes.
This dual-token approach marks a notable shift from the single token model. By incorporating ETH for staking purposes, eOracle connects to a broader and more resilient economic base. This strategy effectively mitigates risks associated with blockchain protocols that rely on protocol-specific tokens.
The following sections provide a mathematical analysis, showing the enhanced security and stability of such a system.
Cryptoeconomic security (CES) is a useful measure for analysis, consider the following;
Given a set of colluding validators that we henceforth term the attacker, we assume that the attacker has the ability to corrupt the majority of the validators. Therefore, the attacker possesses the power to manipulate the consensus process, potentially leading to double-spending, censoring transactions, or altering the integrity of the blockchain's state.
To assess whether attacking is beneficial, the attacker must take into account two elements: the Cost of Corruption () and the Profit from Corruption ().
encompasses the total resources the attacker must invest to successfully manipulate the protocol, i.e., slashing of their stake, technical resources required for the attack and other associated expenses. Since we focus on assessing the efficacy of stake slashing as a deterrent and its influence on the CES, we assume that the primarily involves the loss of the attacker's staked assets, while other costs will be disregarded.
signifies the potential gains the attacker would achieve post-successful manipulation. Our analysis requires a more subtle approach towards , and thus we divide into two sources as follows:
Profit from Manipulation () is the internal profit the attacker can gain by manipulating the protocol. For instance, for Oracle protocols, it is the profit that could be extracted by a malicious price update. The is upper-bounded by the protocol's Total Value Secured (TVS).
Profit from Depreciation () addresses the external profit the attacker can gain from betting on price volatility or depreciation through, e.g., derivative markets or short selling.
Notice that . A rational attacker will only attack if .
We capture this in the following definition.
Definition (CES Margin). A protocol has a -crypto-economic security margin, or a -CES margin, if
In what follows, we explicitly assume that increasing the CES margin implies a more crypto-economically (CE) secure protocol and say that a protocol is CE-secure or CE-vulnerable, referring to a positive or negative CES margin, respectively.
To demonstrate how the CES margin is affected by the nature of the protocol's token, we compare the following two scenarios:
EnshrinedOracle, which relies on the base-layer's token that we denote by $ETH
.
TraditionalOracle, relying on its own token that we denote by $TRD
.
The value and utility of $ETH are independent of EnshrinedOracle's activities, unlike $TRD, whose value is closely tied to the operations of TraditionalOracle.
Under the same attack, the EnshrinedOracle is far more cryptoeconomically secure, as the underlying stake is not derived from the operations of the EnshrinedOracle. In contrast, such an attack would devastate the cryptoeconomic security of the TraditionalOracle.
Being able to short $TRD based on the TraditionalOracle's operations increases the potential profit from attack, whereas there is no such benefit for attacking EnshrinedOracle.
Next, we analyze the ramifications of a sudden decrease of $TRD
market cap. Such a change in valuation could result from the volatile nature of the crypto space or the unintended fault of the protocol.
This observation is demonstrated using an example.
Next, we analyze EnshrinedOracle, relying on the independent $ETH
token. The CES margins of EnshrinedOracle before the event is
The figure below depicts the change in the CES margin of EnshrinedOracle due to the same event. Importantly, under precisely the same event, EnshrinedOracle remains CE secure.
The TraditionalOracle's CE security is far more susceptible to market fluctuations, whereas EnshrinedOracle's security is resilient to external market forces.
Passively, due to an increase in $TRD
market cap.
Let us examine these two solutions. For the passive approach of experiencing an increase in $TRD
market cap, note that the TraditionalOracle cannot (legally) control the price and ensure a positive CES margin. Particularly, if the TVS fluctuation and the price fluctuation are not identical (correlation is not enough in this case), the TraditionalOracle could become CES-vulnerable (a scenario similar to that in Observation 3). The active approach is also challenging, as it requires the TraditionalOracle to call capital on demand while not being connected to an independent pool of capital.
EnshrinedOracle can mitigate a TVS increase by controlling the stake, allowing the CoC to scale accordingly.
TraditionalOracle's security scheme demands stakers hold $TRD
, thus, stakers have to posses a token with relatively small market cap that depends on the protocol's performance. In contrast, EnshrinedOracle could accept stake in $ETH
, the base-layer's token. $ETH
is less volatile, does not suffer from inflation, and is a multi-purpose token. These differences allow EnshrinedOracle to demand less of its stakers compared to TraditionalOracle's stakers, who may demand a premium for the additional risks they take (possessing $TRD
and being exposed to a potential turbulent macroeconomic environment). Additionally, since EnshrinedOracle's stakers could be re-stakers through Eigenlayer, their capital efficiency is maximized.
An independent token makes EnshrinedOracle significantly more CE secure than its counterparts utilizing a staking token. However, oracle sovereign tokens offer other advantages if decoupled from the CES risks.
By rewarding validators with a token, an incentive structure can be designed to increase the rate of rewards. Factors such as uptime, accuracy , and longevity of validators may increase their rewards earned. This achieves both incentivization of higher quality validation, and alignment of validators with the interests of the protocol.
A token vesting mechanism requires validators to be aligned with the network by locking their rewards and ensuring the commitment of the validators during the vesting period. This enhances the stability and security of the network.
A sovereign token design also allows for creating a punishment structures , where rewards can be revoked on non-malicious misbehavior. To avoid slashing Beacon Chain ETH , all non-malicious behavior will addressed with sovereign token punishments.
Implementing all of these mechanisms while having stake rooted in $ETH
retains the CES benefits of EnshrinedOracle while avoiding the CES vunerabilities of TraditionalOracle.
A on Ethereum that help connect Ethereum validators to eOracle via . These contracts manage the network's cryptographic identity, stake records, operator set and enable eOracle to slash validators.
Ideally, the best infrastructure for oracle operations would be Ethereum itself, but the high costs and latency of on-chain processes make this infeasible. To address this, the EO-chain is operated with a subset of the Ethereum validator set using the This chain is used to aggregate and produce cryptographically verifiable data. The EO-Chain is at the center of eOracle operations, offloading computation from the base layer, which reduces costs and latency. The EO-Chain creates immutable records of all eOracle activity. These records are used to cryptographically prove operator rewards and slashing.
are responsible for observing real-world data, validating it, and reporting it to the eOracle chain. are responsible for maintaining the consensus of the eOracle chain. Together, these roles operate the eOracle protocol.
Smart contracts on the EO-chain that enable aggregation and verification of data submitted by validators. These smart contracts produce digitally signed, verifiable data by aggregating the signatures of , accounting for their respective voting power.
eOracle provides to use eOracle data as a pull oracle. Coupled with the , dapps can automate their data usage with or
Smart contracts can be on consumer blockchains to integrate eOracle data. These contracts can verify the validity of signatures produced by the eOracle protocol and enable dapps to read and use their desired data.
Operators running an eOracle node receive transactions with signed reports. The node then verifies the reporter's identity via their cryptographic signature. Due to the protocol's permissionless nature, reports are censorship-resistant. Periodically, smart contracts aggregate the verified reports with dedicated schemes ().
For gas costs and efficiency, the aggregated data is hashed to a leaf of a Merkle tree, mapped to the eOracle state, and signed by the current valid eOracle Validator set. eOracle uses the BLS digital signature scheme, enabling large quorum participation efficiently through threshold signing and . This cryptographic scheme allows for securing desired assets with a scalable signature scheme.
Users interested in low-latency or tailored updates can also use the eOracle REST-API. This enables users to receive all the components to prove the validity of data on-chain, and then execute a dependent transaction. All cryptography, encoding, and parsing
We now discuss the ingredient and suggest a (stylized and simplified) way to quantify it. Crucially, it does not rely on any property of a protocol and refers to any asset, be it cryptocurrency, fiat, or stock.
Consider a token we call $TOK
, and assume that the attacker can short $TOK
. Since we assume the attack is relatively quick, we neglect the shorting fees. The amount of short positions is bounded by $TOK
's short interest. Namely, the percentage of $TOK
's free float market cap that the attacker could short sell, which we denote by . We stress that typically . Further, let denote $TOK
's total market cap (in USD). We therefore assume the attacker can open a short position of USD. Next, let denote the percentage of depreciation due to the attack, for . A short seller can thus earn for every $TOK
they short. All in all, a successful short trade will grant the attacker a profit of USD.
We assume that the only difference between EnshrinedOracle and the TraditionalOracle is the token used for staking. In both scenarios, the market cap of the stake is equal and worth (measured in USD); however, as we show shortly, the two scenarios imply different CES margins. The reason is that an attack's ramifications are different.
For TraditionalOracle ($TRD
), a successful attack on the TraditionalOracle will affect the $TRD
value, as the $TRD
's inherent value is tied to the operations of TraditionalOracle. The attacker can gain USD by shorting $TRD
prior to the attack; hence, in TraditionalOracle's case .
For EnshrinedOracle ($ETH
), as the value and utility of $ETH
are unrelated to the EnshrinedOracle protocol the price of $ETH
will not be affected. Thus, the equals 0 for EnshrinedOracle.
. If the TraditionalOracle, which relies on its own token $TRD
, has a -CES margin, then EnshrinedOracle, which relies on the base-layer's token $ETH
, has a -CES margin.
Observation 1 is illuminating. To illustrate, assume that the TraditionalOracle is a medium-sized decentralized service ( billion USD) with a reasonable short interest ().
Under a severe attack (), its CES margin is smaller by 70-100 million USD compared to EnshrinedOracle.
External, unforeseen events can break the CES of the TraditionalOracle. A crucial observation is that the , which is the stake of the validators, is always smaller than $TRD
's market cap . Let denote the proportion of $TRD
market cap used for staking in the protocol, namely . We use this formulation to analyze the robustness of the protocol and suggest it is susceptible to a death spiral.
For any real number , the TraditionalOracle could be CE-vulnerable even if the cost of corruption is times the profit of manipulation, i.e., .
The above observation means that attacks might be executed even if the is negligible, provided that the attacker can gain from a $TRD
price decrease after the attack. The component should thus reflect not only the TVS (through ) but also the short interest (through ).
Assume the protocol is CE-secure. Any fluctuation in $TRD
market cap can make the protocol CE-vulnerable.
We analyze the CES of TraditionalOracle after a major price drop, which occurs due to, e.g., a major crypto volatility event. We denote by the time of the price drop. We assume that the stake proportion is the attacker's foreseen price drop is , and the short interest is .
Before the attack at , we assume the market cap of $TRD
is (all monetary quantities are given in million USD terms). Consequently, , and Additionally, we assume that before time the potential profit from manipulation is
The event at , which occurs due to a major crypto volatility event, causes the market cap of all crypto tokens to decrease. Particularly, we assume that $TRD
drops by and that the more stable$ETH
drops by . Furthermore, such a market cap change also decreases the . TraditionalOracle's TVS is comprised of different tokens, for instance in $ETH
, wrapped versions of $BTC
, stable coins ($USDT
/$USDC
), and more. Some of those tokens are more volatile than others, and some do not fluctuate at all. We thus assume that, on average, the drops on the same scale as $ETH
, namely by .
The figure below depicts the situation before and after , as we formally analyze next.
Let us analyze the CES margin. Before , we see that the CES margin is positive, since
After , which occurs due to a major crypto volatility event, the market cap of $TRD
drops by and becomes . As a result, the falls to and the drops to . Furthermore, the market cap of all crypto market drops and, as noted above, the drops by . Overall, the CES margin becomes negative, since
Thus, the event at that sparked a price drop made the TraditionalOracle CE vulnerable.
The event at affects EnshrinedOracle's CES margin as well. First, EnshrinedOracle has no as it relies on an independent token; thus, the attacker cannot gain from betting on price drops. Secondly, EnshrinedOracle's decreases due to the drop of $ETH
, by to become. Thirdly, as in the case of TraditionalOracle, the drops by , becoming . Overall, the CES margins of EnshrinedOracle after the event is
Until now, we have focused on , an element that plays a crucial role in the TraditionalOracle but not in EnshrinedOracle. The analysis assisted in understanding how an independent token ($TRD
) decreases the CES margin (Observation 1), making the protocol susceptible to attacks even if the is orders of magnitude greater than the (Observation 2), and could result in vulnerabilities in times of price fluctuations (Observation 3). But relying on a dedicated token $TRD
bares other weaknesses. In the next section, we extend our analysis to challenges in the , particularly around issues of scaling and cost of capital.
Assume that both protocols gain traffic and usage, resulting in a ten-fold increase in the TVS. The higher the TVS, the higher the ; hence, the CES margin decreases dramatically. For simplicity, we shall assume that the is a constant fraction of the TVS. How can the protocols regain their CE security?
To keep the CES margin positive, the should scale linearly with the TVS.
Recall that for TraditionalOracle, where is the staked proportion of $TRD
and is $TRD
market cap. The TraditionalOracle can hence increase its in two ways:
Actively, by increasing the staked proportion .
The TraditionalOracle satisfies , with . EnshrinedOracle has the same and , but zero since it relies on the independent $ETH
token. Its CES margin is thus .
Assume that , namely that . Therefore,
The attack is thus beneficial as long as . Specifically, if the short interest is greater or equal to the stake proportion , the protocol becomes CE-vulnerable if the attacker expects a price drop of . This vulnerability still remains even if , since could potentially reach 1 and for any
Assume that before the event, the market cap satisfies ; thus, the protocol is CE-secure since
Assume that the does not depend on the market cap . This is the case for, e.g., lending markets that mostly offer contracts in $ETH
, etc. Since , there exists a real number , for , such that . Denote by the market cap of $TRD
after the event. Consequently, if , it holds that
thus, the protocol is CE-vulnerable. In other words, if the is not affected by the event, a market cap decrease can spark an attack.
For the sake of this proof, we use the subscript to refer to objects in time ; for instance, is the at time . The CES margin at time is given by
Assume at time the CES margin is positive and equals . Further, assume by contradiction that , where is the . Our assumption about the being a constant fraction of the TVS implies that also holds. By definition, there exists a time for which , and hence
therefore, the protocol is CE-vulnerable at time .
In practice, the attacker would buy leveraged contracts and employ trading strategies. We focus on short positions, ensuring our model is simple yet aligned with reality.
Category
Allocation
Vesting
Purpose
Backers
19.5%
12-months lock
+ 24-months linear vesting
Early funding of R&D
Team
19.5%
12-months lock
+ 24-months linear vesting
Long-term alignment of core contributors
Community Sale
10.0%
12-months streaming
+ 8,12,18-months linear vesting
Expands participation, decentralization and enhances liquidity
Community Initiatives
25.5%
48-months vesting (depending on initiative)
Focused on fostering broad adoption, engagement, and participation through initiatives designed to empower and connect users within the ecosystem.
Ecosystem Development
25.5%
48-months vesting (depending on initiative)
Dedicated to driving innovation and adoption through strategic integrations, partnerships, and targeted investments in R&D to enhance specialized services and infrastructure growth.
Running your data validator and start signing transactions.
eOracle operator activation: Ensure your account has been activated. To check your current status, run the following (1 is activated, 0 is not).
Follow us on X (formerly known as Twitter) to see activation windows and more helpful info. For technical issues, please contact the eOracle team here on the operators-technical-help channel.
Note: Access to our client source code is currently restricted; however, interested parties may contact support@eoracle.io to review the client for security reasons.
Navidate to the data validator directory.
Run the docker.
The command will start the data validator container. If you execute docker ps
you should see an output indicating the eoracle-data-validator
container has the " Up " status with ports assigned. You may view the container logs using
The following example log messages confirm that your eOracle data validator software is up and running. Please ensure that your alias is declared and activated.
To bring the containers down, run the following command:
Upgrade the AVS software for your eOracle data validator by following the steps below:
Pull the latest repo
Merge .env changes Go over .example_env and merge new fields that do not appear in your local .env file
Pull the latest docker images
Stop the existing services
Start your services again. If any specific instructions need to be followed for any upgrade, those instructions will be given with the specific release notes. Please check the latest release notes on Github and follow the instructions before starting the services again.
EigenLayer is a protocol built on Ethereum that introduces restaking, a new primitive in cryptoeconomic security. This primitive enables the reuse of consensus layer ETH. Users that stake ETH natively can opt-in to EigenLayer smart contracts to restake their ETH and extend cryptoeconomic security to additional applications on the network to earn additional rewards.
Reusing ETH to provide security across many services reduces capital costs for a staker to participate and significantly increases the trust guarantees to individual services.
EigenLayer allows services to slash validators based on malicious behavior or coordinated attacks, extending Ethereum's security guarantees to additional protocols.
A guide to registering as an operator.
Operators must declare another ECDSA address to use within the eOracle client. This isolates the Ethereum EigenLayer operator private key from eOracle operations, protecting access to Ethereum assets. You can import a private key or generate a new private key. To import, add --ecdsa-private-key <value>
to the following command.
The output should look like:
The following sections explain how to review status of the operator, troubleshoot registration issues or how to work with plain text private key (discourage)
Prepare your system to run the eOracle operator.
Registered EigenLayer Operator Account: Ensure you have a fully registered EigenLayer operator account. If you don't have one, follow the steps in the EigenLayer Operator Guide to create and fund your account.
Operating System: Linux AMD x64
vCPUs: 2
Memory: 4 GiB
Storage: 100 GB
EC2 Equivalent: m5.large
Expected Network Utilization:
Total download bandwidth usage: 1 Mbps
Upload bandwidth usage: 1 Mbps
Open Ports:
3000 Grafana dashboards
9090 Prometheus
Chain validators operate the EO-Chain node software, creating blocks and processing transactions from Data Validators. They are globally dispersed and are unaffiliated with eOracle.
Chain Validators enable aggregation modules (smart contracts) to receive, validate, and aggregate data. They store all the cryptographic proof of actions that occurred on the EO-Chain and make that information accessible to the public.
Chain validators are critical to providing neutral aggregation and cryptographic attestations of validation. They provide the distributed infrastructure for an open, programmable, and efficient verifiable data layer.
Monitoring the health of your operator setup.
Here you'll find a quick start guide to run the Prometheus, Grafana, and Node exporter stack. Check out the README here for more details. If you want to manually set this up, follow the steps below.
We use prometheus to scrape the metrics from the eOracle data validator container. Make sure to edit the prometheus.yml file, located at Eoracle-operator-setup/data-validator/monitoring
, replacing the placeholders 'PROMETHEUS_PORT', OPERATOR_ADDRESS
, and mainnet|testnet
with your specific values
The relevant lines are:
We allow operators to push the data validator metrics to eOracle monitoring system for extra monitoring. To do so, make sure to edit the vmagent.yml file, located at Eoracle-operator-setup/data-validator/monitoring
, replacing the placeholders 'PROMETHEUS_PORT', OPERATOR_ADDRESS
, and mainnet|testnet
with your specific values
The relevant lines are:
If you see the following error:
Use the same command by prepending sudo
in front of it.
We use Grafana to visualize the metrics from the eOracle AVS.
You can use OSS Grafana for it or any other Dashboard provider.
You should be able to navigate to http://<ip>:3000
and log in with admin
/admin
. This container of Grafana has a Prometheus data source setup using port 9090. If you change the Prometheus port, you need to add a new data source or update the existing data source. You can do this by navigating to http://<ip>:3000/datasources
Useful Dashboards
The eOracle Data Validator dashboard can be used to monitor performance, issues and data source statuses. Explaining each panel on below -
Score
The score panel shows the gauge metric eigen_performance_score
between 0-100 which is calculated based on the performance of the AVS operator and the performance of the backing services.
RPC Req
The RPC Req panel shows the counter and histogram of the total number of json-rpc <method>
requests from the execution client.
eOracle Errors & eOracle Errors Avg 5 min
The eOracle Errors panel shows the counter for the number of errors encountered by the execution client.
Update Rate Duration (s)
The Update Rate duration panel helps visualize the frequency of updates in seconds. For example, in the above chart 91% of the submitted transactions were processed within 0.1 seconds.
eOracle Chain Performance (s)
The eOracle chain panel helps visualize the time between blocks on the eOracle chain. As per the above dashboard, the majority of the blocks are produced within 0.005 seconds.
Data Providers All
The Data providers panel shows the connection status of each data source that the validator pings for price feeds. If one of the sources shows 'FAIL' instead of 'OK', it means the connection to that source is broken.
You can find the json file to import the above dashboard here. Once you have Grafana set up, feel free to import the dashboards.
The eOracle data validator emits eOracle specific metrics. However, it's also important to keep track of the node's health. For this, we will use Node Exporter which is a Prometheus exporter for hardware and OS metrics exposed by *NIX kernels, written in Go with pluggable metric collectors. By default, it is installed and started when you start the entire monitoring stack. If you want to modify the stack, you can install the binary or use docker to run it.
In Grafana dashboards screen, import the node-exporter to see host metrics.
The vmagent is the docker that submits data validator metrics to eOracle central monitoring. This allow us to help you in troubleshoot your operator.
If you don't want to share with us the metrics, remove the vmagent from the docker-compose.yml
in the data-validator/monitoring
folder
eBFT is a secure and novel network employed by eOracle. It consists of a consensus engine (IBFT) and External Validator Set Configuration Protocol (Aegis). eBFT utilizes the to seal blocks, provide specific network capabilities, and govern the network. eOracle EigenLayer-integrated smart contracts on Ethereum work in tandem with the consensus engine, fully implementing the Aegis Protocol.
eBFT's External Validator Set Configuration Protocol (Aegis) is implemented through a set of core smart contracts adhering to the Aegis protocol's specification. These contracts integrate restaking functionality, configure the validator set, and record commitments of the eOracle state.
Immediate block finality: At every chain height, only one block is proposed, and so forking and uncle blocks are avoided. This also mitigates transactions being reverted once on-chain later.
Reduced time between blocks: The construction, validation, and execution time of block forming is efficiently managed, increasing the chain's blockrate.
High data integrity and fault tolerance: IBFT 2.0's Aegis configured Validator Set, part of the Ethereum Validator set, proposes each block. ~66% of these validators must verify the block before addition, making malicious block approval very infeasible. The proposer of the block rotates over time (based on ), ensuring a faulty node cannot exert long-term influence over the chain.
IBFT 2.0 defines a sequence of state transitions that determine chain-wide consensus on the state. A validator proposes a block to be added, which specifies operations updating the blockchain's state.
Validators of the Ethereum Validator Set accept valid proposed blocks. Each validator's voting allocated stake determines their voting weight, and a supermajority of validators must verify a block for it to be accepted.
When a validator proposes a new block, other validators verify it and vote on whether to accept it, and this can be repeated if needed. During each round of repetition, a threshold number of validators must verify and sign the block for it to be added to the blockchain. If the threshold isn't reached, the next round will begin. Another validator will then propose a block and repeat the process.
If the proposed block is verified and signed by the threshold number of validators, it's accepted and reflected in the new state of the blockchain.
The proposer is chosen to construct a block at the block rate. The proposer selection mechanism is based on , through a deterministic selection algorithm. Validators with more voting power get selected more frequently.
A validator's voting power is proportional to the amount staked. This means that validators with more stake will have more voting power and, therefore, more influence over the decision-making process on the network. This also provides an economic incentive for validators to behave honestly and act in the network's best interest.
EBFT is using the , leveraging its external staking design and cross-chain features. The Aegis protocol completes and secures the network through integration with Ethereum native validators through EigenLayer.
Data validators operate eOracle software to report data to the eOracle network. They are globally dispersed and are unaffiliated with eOracle. Data validators receive rewards and are subject to slashing via . Validation behavior is tracked, monitored, and cryptographically provable. This assures the eOracle network's security, as all validation activity is attributable and immutable , and forms the basis of rewards and slashing mechanisms which are applied to data validators.
Data validators retrieve data through an internet connection and provide cryptographic assurance of what they observe. They accomplish this assurance by submitting a . This signature is part of a highly secure cryptographic scheme optimized for threshold signatures.