Mycelia Signal serves cryptographically signed price attestations over two payment protocols: Lightning sats via L402 and USDC on Base via x402. 61 endpoints across crypto, stablecoin pegs, FX, economic indicators, and commodities — no API keys, no accounts, no trust assumptions.
Regulators across three major jurisdictions are moving from recommending independent price verification to requiring it. The infrastructure gap is closing.
"Valuation must derive from at least three independent oracle feeds, with the median or other outlier-resistant aggregation method employed."
— SEC/CFTC Technical Framework for Tokenized Collateral, Section 4.3.1 (November 2025)Tokenized collateral framework requires multiple independent oracles with cryptographic attestation. Final rulemaking expected August 2026.
CP25/40 introduces crypto lending regulation with independent pricing requirements. Proprietary feeds face the same scrutiny as proprietary tokens.
Grandfathering expires July 1, 2026. CASPs must demonstrate transparent pricing methodologies and consumer protection standards.
Most price feeds are free — which means you're not the customer, you're the product. Opaque methodologies, silent failures, hidden dependencies, and no cryptographic proof that the number you received is the number that was signed.
APIs return a number. No signature, no source list, no timestamp proof. You can't verify it, you can't audit it, you can't submit it on-chain.
Where did the price come from? Which exchanges? What aggregation? Most feeds don't tell you — and you can't check even if they did.
API keys, rate limits, terms of service, account verification. Your access can be revoked. Your data dependency is someone else's leverage.
Free oracles answer to advertisers, governance tokens, or protocol treasuries — not to you. When the data is free, accuracy is optional.
Machines need price data. Some have Lightning wallets. Some have USDC. An oracle should serve both without forcing a choice.
The original Sovereign Lightning Oracle. Pay 10 sats over Lightning, receive a secp256k1 ECDSA-signed price attestation. Sub-second settlement. Bitcoin-native.
The Sovereign HTTP Oracle. Pay from $0.01 USDC on Base, receive an Ed25519-signed price attestation. Optimistic delivery. EVM-native.
Same oracle core. Same 9-exchange aggregation. Same canonical message format. Same sources. Different signature, different payment rail — both independently verifiable.
Every response includes canonical data, source identifiers, UTC timestamp, and a verifiable cryptographic signature. L402 (Lightning) responses are secp256k1 ECDSA signed. x402 (USDC) responses are Ed25519 signed. Pay with Lightning sats or USDC on Base — no API keys, no accounts.
Both protocols route to the same oracle backends. The same price, from the same sources, signed for your stack.
Lightning wallet
Invoice + macaroon
Port :8080
secp256k1 ECDSA
USDC on Base
402 + USDC verification
Port :8402
Ed25519
61 endpoints · crypto, FX, economic indicators, commodities · canonical message format · shared across both protocols
Beyond signed price data, Mycelia Signal operates a Discreet Log Contract oracle — enabling two parties to settle financial contracts on Bitcoin L1 without a custodian, without escrow, and without the oracle ever knowing the contract terms.
Register a strike price and direction. The oracle monitors continuously and attests the moment the price crosses. Used for Bitcoin-collateralized loans, liquidation triggers, and conditional settlement.
Pre-announced 35 days ahead at daily, weekly, and monthly expiries. The oracle attests the exact price using digit decomposition — enabling counterparties to construct CETs covering every possible outcome.
Register via L402 Lightning (10,000 sats) or x402 USDC ($7.00). Both rails supported simultaneously.
BIP-340 compatible Schnorr over secp256k1. Per-instance keypairs — US and Asia GC are cryptographically independent.
The oracle never learns the contract terms, counterparty identities, or collateral amounts. Privacy is architectural, not a policy.
Receive attestations pushed to your endpoint the moment a threshold is breached or a numeric contract matures.
Both protocols follow the same pattern: request, pay, retry, receive signed data. No SDK, no onboarding, no API keys.
/oracle/price/btc/usdX-Payment header/oracle/price/btc/usdAuthorization: L402 <macaroon>:<preimage>{
"pair": "BTC/USD",
"price": "84231.50",
"timestamp": "2026-02-28T07:51:00Z",
"sources": "coinbase,kraken,bitstamp,gemini,bitfinex,okx,bybit,htx,gate",
"signature": "a3f8c2d9...signature...b7d10442",
"pubkey": "0x4a2b7c...public_key",
"canonical": "v1|BTCUSD|84231.50|USD|2|1709107860|nonce|sources|median"
}
On-chain price feeds backed by independent, multi-source attestation. Verifiable signatures that smart contracts can validate without trusting the transport.
Autonomous machines that need real-time prices pay per query — over Lightning or USDC. No API keys, no accounts, no human in the loop. MCP server included.
Independent price attestation for margin calls, collateral valuation, and regulatory audit trails. A second signature proving the price was accurate and independently sourced.
Schnorr-signed attestations for Discreet Log Contracts on Bitcoin L1. Trustless settlement of financial contracts without custodial intermediaries.
A DeFi protocol's margin constraints, liquidation logic, and collateral rules all work exactly as designed — until the oracle tells them the wrong price. Oracle integrity is a distinct security layer that requires a distinct architectural solution.
A $285 million DeFi exploit on a major Solana perpetuals exchange was executed not through a code vulnerability, but through a manipulated oracle. The attacker spent weeks building a fake price history for a worthless token, then used admin access to introduce it as collateral. The protocol's margin constraints worked exactly as designed — against the wrong price. Two security audits had passed the protocol. Neither caught the oracle manipulation surface. Full analysis →
Legacy DeFi oracles accept new price feeds through admin keys or governance votes. Any actor with sufficient access can introduce a manipulated feed for any token — including a fabricated one.
A single oracle feed — once manipulated — becomes the protocol's entire reality. No quorum, no cross-check, no second opinion. The protocol cannot distinguish a legitimate price from an injected one.
Fixed immutable asset lists. No shared governance. No admin keys. Quorum required before any collateral price is accepted. A fake token never appears in any sovereign feed — the quorum is never reached.
Mycelia Signal operates with a fixed, predetermined asset list. There is no admin function to add new tokens, no governance mechanism to vote through a feed change, no permission layer to compromise. The oracle can only attest to what it was built to attest to — and nothing else.
Two payment rails. 61 endpoints across crypto, stablecoin pegs, FX, economic indicators, and commodities. Cryptographic proof at every layer.