Token State Fingerprint
The ERC-5646 proposal is a standard for creating an unambiguous identifier for the state of a mutable token without needing knowledge of its implementation details. It defines the minimum interface required to identify the state of a token and includes a function called getStateFingerprint, which returns a unique value for each token state. The function takes in the token ID as a parameter and returns a bytes32 value that includes all state properties that might change during the token lifecycle, as well as computed values and token metadata URI. The proposal also specifies that getStateFingerprint should not return a different value when the token state remains the same and should include all state properties that might change during the token lifecycle. Additionally, the proposal includes a requirement that supportsInterface(0xf5112315) must return true. The motivation behind this proposal is to avoid the bottleneck problem that arises when protocols need to support every new token specifically. By using state fingerprints as part of a token identifier, protocols can support mutable tokens without needing knowledge of their implementation details. The proposal is not intended for use cases where token state property knowledge is required, as these cases cannot escape the bottleneck problem.
Videos
Original
Abstract
This specification defines the minimum interface required to unambiguously identify the state of a mutable token without knowledge of implementation details.
Motivation
Currently, protocols need to know about tokens' state properties to create the unambiguous identifier. Unfortunately, this leads to an obvious bottleneck in which protocols need to support every new token specifically.
Specification
The key words "MUST", "MUST NOT", "SHOULD", "SHOULD NOT", and "MAY" in this document are to be interpreted as described in RFC 2119.
pragma solidity ^0.8.0; interface ERC5646 is ERC165 { /// @notice Function to return current token state fingerprint. /// @param tokenId Id of a token state in question. /// @return Current token state fingerprint. function getStateFingerprint(uint256 tokenId) external view returns (bytes32); }
getStateFingerprint
MUST return a different value when the token state changes.getStateFingerprint
MUST NOT return a different value when the token state remains the same.getStateFingerprint
MUST include all state properties that might change during the token lifecycle (are not immutable).getStateFingerprint
MAY include computed values, such as values based on a current timestamp (e.g., expiration, maturity).getStateFingerprint
MAY include token metadata URI.supportsInterface(0xf5112315)
MUST returntrue
.
Rationale
Protocols can use state fingerprints as a part of a token identifier and support mutable tokens without knowing any state implementation details.
State fingerprints don't have to factor in state properties that are immutable, because they can be safely identified by a token id.
This standard is not for use cases where token state property knowledge is required, as these cases cannot escape the bottleneck problem described earlier.
Backwards Compatibility
This EIP is not introducing any backward incompatibilities.
Reference Implementation
pragma solidity ^0.8.0; /// @title Example of a mutable token implementing state fingerprint. contract LPToken is ERC721, ERC5646 { /// @dev Stored token states (token id => state). mapping (uint256 => State) internal states; struct State { address asset1; address asset2; uint256 amount1; uint256 amount2; uint256 fee; // Immutable address operator; // Immutable uint256 expiration; // Parameter dependent on a block.timestamp } /// @dev State fingerprint getter. /// @param tokenId Id of a token state in question. /// @return Current token state fingerprint. function getStateFingerprint(uint256 tokenId) override public view returns (bytes32) { State storage state = states[tokenId]; return keccak256( abi.encode( state.asset1, state.asset2, state.amount1, state.amount2, // state.fee don't need to be part of the fingerprint computation as it is immutable // state.operator don't need to be part of the fingerprint computation as it is immutable block.timestamp >= state.expiration ) ); } function supportsInterface(bytes4 interfaceId) public view virtual override returns (bool) { return super.supportsInterface(interfaceId) || interfaceId == type(ERC5646).interfaceId; } }
Security Considerations
Token state fingerprints from two different contracts may collide. Because of that, they should be compared only in the context of one token contract.
If the getStateFingerprint
implementation does not include all parameters that could change the token state, a token owner would be able to change the token state without changing the token fingerprint. It could break the trustless assumptions of several protocols, which create, e.g., buy offers for tokens. The token owner would be able to change the state of the token before accepting an offer.
Copyright
Copyright and related rights waived via CC0.
Adopted by projects
Not miss a beat of EIPs' update?
Subscribe EIPs Fun to receive the latest updates of EIPs Good for Buidlers to follow up.
View all