Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Signed Data Feed

A signed data feed is a stream of data, such as environmental sensor readings, cryptographically signed by its source or an oracle to guarantee its authenticity and integrity for on-chain use.
Chainscore © 2026
definition
DATA INTEGRITY

What is a Signed Data Feed?

A signed data feed is a cryptographically verifiable stream of off-chain information, such as price or weather data, that is authenticated by a trusted oracle before being delivered to a blockchain.

A signed data feed is a data stream where each piece of information is accompanied by a cryptographic signature from a trusted provider, known as an oracle. This signature acts as a digital seal of authenticity, proving that the data originated from the specified source and has not been altered in transit. On-chain smart contracts can verify this signature using the oracle's public key before accepting the data for execution, enabling them to securely interact with real-world information. This mechanism is foundational for decentralized finance (DeFi) applications, which rely on accurate price feeds for functions like lending, stablecoin minting, and derivatives pricing.

The process typically involves an oracle node fetching data from an external API, signing it with its private key, and broadcasting the data-value-signature tuple to the network. Major oracle networks like Chainlink employ this model, where multiple independent nodes produce signatures for the same data point. A decentralized oracle network (DON) then aggregates these responses to produce a single, robust data point with a collective signature, enhancing security and reliability by mitigating the risk of a single point of failure or manipulation.

From a technical perspective, the signature is often generated using the Elliptic Curve Digital Signature Algorithm (ECDSA), the same standard used in Ethereum for transaction signing. A smart contract stores the oracle's public address and uses the built-in ecrecover function (or an equivalent) to validate that the signature matches the provided data. This creates a cryptographic proof that is immutable once recorded on-chain, allowing any participant to audit the provenance of the data that triggered a contract's state change.

how-it-works
MECHANISM

How a Signed Data Feed Works

A signed data feed is a cryptographically secured stream of off-chain information, such as asset prices or weather data, made available for on-chain smart contracts to consume.

A signed data feed is a mechanism for delivering verifiable off-chain data to a blockchain. It works by having a trusted entity, known as an oracle, fetch data from an external source (like an API), cryptographically sign it with its private key, and publish the data alongside the signature on-chain. Smart contracts can then verify the signature against the oracle's known public key to confirm the data's authenticity and integrity before using it in their logic. This process creates a tamper-proof bridge between the deterministic blockchain and the unpredictable real world.

The core technical components are the data point (the value itself, e.g., ETH/USD: 3500), the digital signature (a cryptographic proof generated using the oracle's private key), and the oracle's public key (stored on-chain for verification). When a smart contract receives the signed data, it uses a pre-compiled function like ecrecover (in Ethereum) to compute which public key created the signature. If it matches the trusted oracle's key, the data is accepted. This ensures the data has not been altered in transit and definitively originated from the authorized source.

A primary use case is for decentralized finance (DeFi) protocols, which rely on accurate price feeds for functions like determining loan collateralization ratios or settling derivatives contracts. For example, a lending protocol needs to know the current market value of a user's collateral; it queries a signed feed from an oracle network like Chainlink. The contract verifies the signatures and uses the attested price to decide if a position is undercollateralized and subject to liquidation. Without this signed attestation, a contract would have to trust a single, potentially malicious, data provider.

While a single-oracle signed feed provides basic security, it introduces a central point of failure. To mitigate this, production systems typically use decentralized oracle networks (DONs). Here, multiple independent oracles fetch and sign the same data point. An aggregation contract collects these responses, often discarding outliers, and produces a single consensus value that is then signed by the network itself. This decentralized approach significantly increases data reliability and censorship resistance, as compromising the feed would require compromising a majority of the independent oracle nodes.

From a developer's perspective, integrating a signed data feed involves specifying the data source (job ID), the oracle address(es), and the update frequency. The oracle service handles the off-chain polling and signing, emitting an on-chain event (a log) containing the new data. The consuming smart contract is typically designed to be upgraded or configured to point to a new oracle address if needed, allowing for maintenance and responses to evolving security requirements. This architecture separates the concerns of data fetching and verification from core contract business logic.

key-features
CORE MECHANICS

Key Features of Signed Data Feeds

A signed data feed is a cryptographically secured stream of off-chain data, where a trusted provider signs each data point with their private key to guarantee its authenticity and integrity for on-chain verification.

01

Cryptographic Signatures

The core security mechanism where each data point is signed with the provider's private key. This creates a digital signature that can be verified on-chain using the corresponding public key. This proves the data originated from the authorized signer and has not been tampered with in transit.

02

Data Integrity & Authenticity

The signature provides two critical guarantees:

  • Integrity: The data received is exactly the data that was signed; any alteration invalidates the signature.
  • Authenticity: The data is verified to have come from the specific, known signer (e.g., Chainlink, Pyth Network). This prevents spoofing and man-in-the-middle attacks.
03

Off-Chain Computation

Complex data aggregation and computation happen off-chain. A provider collects data from multiple sources (e.g., CEXs, DEXs), applies a weighted median or other aggregation logic, and then signs the final result. This enables access to high-frequency, resource-intensive data that would be prohibitively expensive to compute directly on-chain.

04

On-Chain Verification

Smart contracts verify the signed data by using a pre-configured oracle address (public key). The contract uses the ecrecover function (or equivalent) to check the signature against the provided data. Only data with a valid signature from the trusted oracle is accepted, making the feed tamper-proof within the contract's logic.

05

Decentralization & Trust Minimization

While a single signer represents a point of trust, systems can be decentralized by using multiple independent signers. Data is considered valid only when a quorum of signatures (e.g., 3-of-5) is achieved. This removes single points of failure and collusion risks, moving towards a trust-minimized oracle model.

06

Use Cases & Examples

Signed feeds are the backbone of DeFi and on-chain automation:

  • Price Oracles: Provide asset prices for lending (Aave), derivatives (dYdX), and stablecoins.
  • Cross-Chain Messaging: Verify state proofs from another blockchain (LayerZero, Wormhole).
  • Randomness: Deliver verifiable random numbers for NFTs and gaming (Chainlink VRF).
  • Event Outcomes: Report real-world sports or election results for prediction markets.
examples
SIGNED DATA FEED

Examples & Use Cases

Signed data feeds provide verifiable, off-chain information to smart contracts. Here are key applications where their integrity and timeliness are critical.

04

Insurance & Parametric Triggers

Automating payouts for parametric insurance contracts. A signed data feed delivers objective, real-world data that acts as a trigger condition. Examples include:

  • Weather data (wind speed, rainfall) for crop insurance.
  • Flight status data for travel delay insurance.
  • Earthquake magnitude from seismic sensors. When the signed data meets the predefined threshold in the contract, claims are paid automatically without manual assessment, reducing fraud and administrative cost.
< 1 min
Payout Time
05

Reputation & Identity Attestations

Encoding off-chain identity or reputation scores into a portable, verifiable format. A trusted issuer (e.g., a DAO, a KYC provider) can sign a statement about a user's attributes, such as:

  • Proof-of-humanity or unique identity.
  • Credit score or on-chain transaction history attestation.
  • DAO membership or governance participation level. The user can then present this signed attestation to other applications to access gated services or qualify for under-collateralized lending based on reputation.
06

Sports & Event Results

Settling prediction markets and fantasy sports leagues. Official data providers (e.g., sports leagues, event organizers) sign the final outcome of a match or event. This signed result is relayed to the prediction market's oracle or resolution contract. The contract verifies the signature from the authorized publisher and automatically distributes winnings to correct predictions, ensuring trustless and timely settlement without a central arbitrator.

99.9%
Uptime SLA
ecosystem-usage
SIGNED DATA FEED

Ecosystem Usage

A signed data feed is a cryptographically verifiable stream of off-chain information, signed by a trusted oracle or data provider, enabling smart contracts to securely consume real-world data. Its primary use cases span DeFi, identity, and cross-chain communication.

04

Identity & Credential Attestations

Signed data feeds enable off-chain verification of identity claims for on-chain use. A trusted issuer (e.g., a government, DAO, or KYC provider) can sign a credential stating a user's attributes. This signed attestation can be used by smart contracts for:

  • Sybil-resistant airdrops and governance token distribution.
  • Compliant DeFi with gated access based on jurisdiction or accreditation.
  • Decentralized identity systems where credentials are portable and verifiable across applications.
05

Automated Event Execution

Signed data feeds trigger smart contract execution based on real-world events, creating autonomous conditional logic. An oracle network monitors for a predefined condition (e.g., "flight delayed over 2 hours" or "sports team X wins"), verifies it, and submits a signed attestation. This powers:

  • Parametric insurance payouts that are automatic and trustless.
  • Prediction market resolutions without a centralized arbiter.
  • Supply chain contracts that release payment upon verified delivery.
06

Data Auditing & Compliance

Signed feeds create an immutable audit trail for off-chain data consumed by blockchains. Each data point is timestamped, signed, and recorded on-chain, providing cryptographic proof of provenance. This is essential for:

  • Regulatory reporting where financial data must be verifiably sourced.
  • Enterprise blockchain applications requiring data integrity for settlements.
  • Proof of reserves where exchanges or custodians periodically attest to their holdings via signed balance sheets.
COMPARISON

Signed Data Feed vs. Other Data Sources

A technical comparison of data source types based on core attributes relevant to on-chain integration and trust assumptions.

FeatureSigned Data FeedCentralized APIBasic Oracle Network

Data Integrity Guarantee

On-Chain Verifiability

Censorship Resistance

Data Freshness (Typical Latency)

< 1 sec

< 100 ms

2-60 sec

Operational Cost (per 1M req)

$10-50

$0-10

$100-500

Single Point of Failure

Requires Off-Chain Trust

Native Cryptographic Proof

Attestation

TLSNotary / TEE

security-considerations
SIGNED DATA FEED

Security Considerations

A signed data feed's security is defined by the trust model of its oracle and the cryptographic integrity of its off-chain data. These cards detail the critical vulnerabilities and attack vectors.

01

Oracle Centralization Risk

The primary security risk is the single point of failure at the oracle level. If the private key of the data signer is compromised, or the oracle operator acts maliciously, the feed can broadcast incorrect data. This can lead to:

  • Manipulated pricing causing liquidations or unfair trades.
  • Transaction censorship by withholding signatures.
  • Systemic protocol failure if the feed is a primary dependency.

Security depends entirely on the oracle's operational security and honesty.

02

Data Source Integrity

Cryptographic signatures only prove the data came from a specific signer, not that the underlying data is correct. The oracle must secure its own data sourcing pipeline. Key vulnerabilities include:

  • API compromise at the source (e.g., CoinGecko, Binance).
  • Man-in-the-middle attacks between the source and oracle.
  • Flash loan attacks on decentralized exchanges used for price calculation.

A signature on manipulated source data is worthless.

03

Signature Replay & Malleability

The on-chain verification contract must correctly validate signatures to prevent replay attacks. Critical implementation checks include:

  • Inclusion of a nonce or timestamp to ensure data freshness.
  • Verification of the v, r, s ECDSA components.
  • Use of EIP-712 typed structured data to prevent signature malleability across different domains.

A weak verification function can allow old or fraudulent data to be re-submitted.

04

Key Management & Rotation

The lifecycle of the signing key is a critical attack surface. Best practices involve:

  • Hardware Security Modules (HSMs) for private key storage.
  • Multi-party computation (MPC) or multi-sig schemes to distribute signing authority.
  • Proactive key rotation schedules to limit exposure from a potential leak.
  • Revocation mechanisms for compromised keys in the verification contract.

Poor key management is a common failure point for centralized oracles.

05

Economic & Governance Attacks

Attackers may target the economic incentives or governance of the oracle provider. This includes:

  • Bribing or coercing oracle operators (bribery attacks).
  • Governance takeover of a decentralized oracle network to manipulate data.
  • Sybil attacks to create fake data providers in a decentralized system.

These attacks bypass technical cryptography by targeting the human or economic layer.

SIGNED DATA FEEDS

Common Misconceptions

Clarifying frequent misunderstandings about the security, decentralization, and operational mechanics of signed data feeds (oracles).

No, a signed data feed is not a blockchain; it is a service that provides cryptographically signed off-chain data to a blockchain. A blockchain is a distributed ledger that records and validates transactions, while a signed data feed (or oracle) acts as a bridge, fetching, verifying, and delivering external data (like price feeds) to smart contracts. The signature proves the data originated from a trusted source, but the data itself is not stored on-chain until a contract requests and submits it. Key differences:

  • Blockchain: Consensus on state, immutable history, peer-to-peer network.
  • Signed Data Feed: Data sourcing, attestation, and delivery mechanism.
SIGNED DATA FEED

Technical Details

A signed data feed is a cryptographically secured stream of information, where each data point is accompanied by a digital signature from a trusted source. This section details the mechanisms, security guarantees, and technical implementation of these critical components for decentralized applications.

A signed data feed is a stream of off-chain data (like asset prices, weather, or sports scores) that is cryptographically signed by a trusted oracle or data provider before being delivered on-chain. It works by having the provider generate a digital signature for each data payload using its private key. This signature, along with the raw data, is then submitted to a smart contract. The contract verifies the signature against the provider's known public key, ensuring the data's authenticity and integrity before it is used in any transaction or logic.

Key components of this process include:

  • Data Source: The origin of the raw information.
  • Signer Node: The entity that fetches data and creates the signature.
  • Signature: A cryptographic proof (e.g., ECDSA, EdDSA) linking the data to the signer.
  • On-chain Verifier: The smart contract function that validates the signature.
SIGNED DATA FEED

Frequently Asked Questions (FAQ)

Essential questions and answers about signed data feeds, a core component for secure, verifiable off-chain data in blockchain applications.

A signed data feed is a mechanism where a trusted data provider cryptographically signs off-chain data, allowing it to be verified on-chain. It works through a defined workflow: first, a provider (or oracle) retrieves data from an external source, such as a stock price API. Next, they generate a cryptographic signature for that data using their private key. This signature, along with the raw data, is then made available to users or smart contracts. On-chain, a contract can verify the signature against the provider's known public key, ensuring the data is authentic and has not been tampered with since signing. This creates a trust-minimized bridge between off-chain information and on-chain logic.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Signed Data Feed: Definition & Use in Blockchain | ChainScore Glossary