OracleNet: Building an Autonomous MCP Mesh That Understands, Executes, Proves, and Learns
90 specialized oracles. 1,200+ tools. Neural routing that gets smarter with every call. On-chain settlement on Base. This is what it takes to go from MCP server to autonomous agent infrastructure.
The Problem Nobody Talks About
There are over 10,000 MCP servers in the wild. Most do one thing: expose a few tools behind a JSON-RPC interface. An AI agent connects, calls a tool, gets a response. That's useful. But it's not infrastructure.
When you have hundreds of specialized tools across compliance, blockchain, finance, security, and business intelligence, the question changes. It's no longer "how do I expose a tool?" — it's "how does an agent find the right tool, trust it, pay for it, and prove the result?"
That's what OracleNet solves. Not another MCP server. A coordination layer that sits above MCP servers and turns isolated endpoints into a functioning autonomous mesh.
What "Autonomous Mesh" Actually Means
We define autonomy through a concrete loop that must work end-to-end without human intervention:
Understand → Route → Execute → Prove → Settle → Learn → Defend
An agent sends a natural language query. OracleNet parses the intent, finds the best oracle based on learned routing weights, executes the MCP call, generates a SHA-256 content hash as proof, optionally settles the deal on-chain via USDC escrow, logs a neural synapse that updates future routing, and monitors for abuse through five defense layers.
One call. No manual steps.
Architecture: How It Works
quantum_ask — The Front Door
An external agent doesn't need to know which of our 100+ servers has the right tool. It calls quantum_ask with a question in English or German:
"Is USDT compliant for trading in the EU under MiCA?"
The intent parser (keyword matching + LLM fallback) identifies this as a compliance query, selects compliance_preflight as the best tool, and routes to the ComplianceOracle. The entire resolution takes under 200ms.
quantum_execute — The Muscle
Once the tool is identified, quantum_execute handles the actual MCP call — including session handshake, SSE response parsing, and error handling. It works across all 100+ servers regardless of their individual MCP implementation details.
Every execution automatically logs a neural synapse: which oracle was called, how fast it responded, whether it succeeded. This feeds into routing weights that improve over time.
Neural Routing — The Brain
After thousands of executions, the neural layer builds a performance map. Oracles that respond fast and correctly get higher weights. Oracles that fail or timeout get downweighted. The routing engine uses these weights to prefer better-performing oracles for each capability.
Current stats: 182 synapses logged, 70 weights across 38 oracles, automatic reward calculation based on success rate and response time.
On-Chain Settlement — The Proof
Every execution generates a SHA-256 content hash. For paid calls, this hash is anchored on-chain via a Base Mainnet escrow smart contract. The flow: Create Deal (lock USDC) → Deliver (submit proof hash) → Settle (release funds). 104 deals settled, 100% success rate, verifiable on BaseScan.
90 Oracles Across 7 Categories
| Category | Oracles | Tools |
|---|---|---|
| Compliance & Regulation | 40 | 521 |
| Trust & Agent Infrastructure | 10 | 107 |
| Finance & Markets | 10 | 116 |
| Business Intelligence | 10 | 97 |
| Travel & Lifestyle | 8 | 79 |
| Blockchain & DeFi (13 chains) | 14 | 150 |
| Payment & Settlement | 4 | 48 |
Blockchain coverage includes BTC, ETH, XRPL, Solana, Arbitrum, TON, SUI, Hedera, Base, BNB, Stellar, Aptos, and Flare — each with chain-specific DeFi, risk, and compliance tools.
Hardening: What Makes It Production-Ready
An autonomous system that isn't hardened is a liability. Here's what we built beyond the happy path:
| Protection | Detail |
|---|---|
| Idempotency | Request-hash dedup with 5 min TTL. Identical calls return cached results, no duplicate billing or synapse logging. |
| Circuit Breaker | 3 consecutive failures on an oracle → circuit opens for 120s → half-open probe with reduced timeout. Prevents cascade failures. |
| Rate Limiting | 30 calls/min per caller DID. Prevents abuse without blocking legitimate usage. |
| Replay Protection | Timestamp-based, 5 minute window. Old or replayed requests are rejected. |
| Response Validation | 1MB size limit, type checking. Malicious or malformed oracle responses are caught before reaching the caller. |
| Escrow Security | Service-key required for on-chain settlement. Max 1 USDC per deal. No external agent can drain the wallet. |
Defense: Five Autonomous Layers
Security in an autonomous mesh can't be manual. We run five defense layers that operate continuously:
Honeypot — Five canary tokens (fake API keys for AWS, GitHub, OpenAI, FeedOracle, ToolOracle) distributed across the mesh. Any agent that uses one is immediately flagged.
Behavioral Baseline — Every agent's request pattern is profiled. Anomalies (sudden bursts, unusual tool access, new IP ranges) trigger alerts.
Counter-Intelligence — Attackers are classified by sophistication and intent. Response modes escalate automatically: observe → slow → deceive → isolate → block.
Self-Evolution — The mesh analyzes its own intelligence sources and proposes new policies. A human approves or rejects via Telegram. Approved policies are tracked for effectiveness.
Immune System — Every 15 minutes, neural weights are analyzed. Agents with degrading performance get downgraded. Agents with consistent failures get quarantined. Good behavior restores trust.
Observability: Proving It Works 24/7
Claims without data are marketing. Here's what runs continuously:
Soak Test — 12 queries across 6 categories, every 5 minutes. Results at tooloracle.io/oraclenet/soak.json. Current: 100% success rate, 72ms average, 251ms p95.
Cockpit — Oracle health (healthy/degraded/failing), neural weight trends, security status, soak history. Live at tooloracle.io/oraclenet/cockpit.json.
Beacon — 100+ servers monitored every 5 minutes with trust VCs. Anchored on Polygon, XRPL, Hedera, and Base.
Connect in 30 Seconds
claude mcp add --transport http oraclenet https://tooloracle.io/quantum/mcp/
Then ask anything:
"Is EURC MiCA compliant?" "What is the current Fed rate?" "Bitcoin network overview" "Find CVE vulnerabilities" "Run a DORA readiness check"
Free tier: 100 calls/day, no registration. Paid: x402 USDC on Base.
What's Next
The system runs. The soak test proves stability. The neural layer learns. The escrow settles on-chain. But "autonomous" isn't a checkbox — it's a spectrum. We're watching the 7-day soak data to identify which oracles degrade under sustained load, where the neural weights stabilize, and which defense layers need real-world tuning.
The code is open source: github.com/ToolOracle/oraclenet