circle-info
This is the first version of our Documentation, it will be improved and extended soon.
Page cover

Verification Proofs

IFÁ Labs prioritizes transparency and independent verifiability. While the core price feeds are fully trustless once onchain, we provide tools and methods for anyone — developers, auditors, or end-users — to independently confirm that stored prices accurately reflect real-world market data.

1. Onchain Data Transparency

Every price stored in the oracle contract is publicly readable:

  • Use getAssetInfo(assetId) to fetch price, decimal, and lastUpdateTime.

  • All historical updates are immutable on the blockchain and can be queried via block explorers or subgraphs.

This allows direct verification against external market sources at any time.

2. Event Logs for Audit Trails

Price updates emit PriceUpdated events:

  • Indexed by assetId for easy filtering.

  • Include full price details and timestamp.

Offchain indexers (e.g., The Graph, Dune Analytics) can reconstruct complete price histories for analysis or alerts.

3. Source Transparency (Future Expansion)

Upcoming features include:

  • Onchain listing of active data sources per asset.

  • Optional signed proofs from individual sources (Merkle inclusions) for advanced validation.

These will enable cryptographic verification that the aggregated price matches reported source values.

4. Independent Validation Steps

To manually verify a price:

  1. Read the current onchain value via Basescan or your contract.

  2. Cross-reference with multiple public sources (e.g., CoinGecko, TradingView, local exchanges for emerging stablecoins).

  3. Confirm the onchain price falls within the reasonable range of observed market rates.

For stablecoins, expect tight alignment (±0.5% typical) with peg.

5. Third-Party Monitoring

Community and institutional users are encouraged to:

  • Run monitoring nodes that alert on deviations or staleness.

  • Integrate with multi-oracle systems for added redundancy.

IFÁ Labs feeds are designed for seamless independent scrutiny — no proprietary data or hidden logic.

Next: Report a Vulnerability — how to securely disclose potential issues.

Last updated

Was this helpful?