Skip to content

Conversation

@astroyhzcc
Copy link

When opening a pull request to submit a new EIP, please use the suggested template: https://github.com/ethereum/EIPs/blob/master/eip-template.md

We have a GitHub bot that automatically merges some PRs. It will merge yours immediately if certain criteria are met:

  • The PR edits only existing draft PRs.
  • The build passes.
  • Your GitHub username or email address is listed in the 'author' header of all affected PRs, inside .
  • If matching on email address, the email address is the one publicly listed on your GitHub profile.

@eip-review-bot
Copy link
Collaborator

eip-review-bot commented Mar 28, 2025

File ERCS/erc-7924.md

Requires 1 more reviewers from @g11tech, @SamWilsn, @xinbenlv

@eip-review-bot eip-review-bot changed the title eip for stable coin maximum supply management Add ERC: ERC-20 totalSupply Extension Mar 31, 2025
ERCS/erc-7924.md Outdated
---
eip: 7924
title: ERC-20 totalSupply Extension
description: A Simple Mechanism to Manage the Maximum Supply of Stablecoin Compliant with ERC-20.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
description: A Simple Mechanism to Manage the Maximum Supply of Stablecoin Compliant with ERC-20.
description: Manage the maximum supply of ERC-20 stablecoins.

I'd suggest removing fluff from your description and optionally using the extra space to further describe your proposal.

ERCS/erc-7924.md Outdated

## Abstract

This proposal defines a validator role for ERC20-compliant stablecoins and introduces the concept of maximum supply. Validators manage stablecoin collateral and calculate the maximum token supply based on collateral value. The maxSupply method is provided to query the current supply cap, ensuring totalSupply never exceeds maxSupply.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
This proposal defines a validator role for ERC20-compliant stablecoins and introduces the concept of maximum supply. Validators manage stablecoin collateral and calculate the maximum token supply based on collateral value. The maxSupply method is provided to query the current supply cap, ensuring totalSupply never exceeds maxSupply.
This proposal defines a validator role for ERC20-compliant stablecoins and introduces the concept of maximum supply. Validators manage stablecoin collateral and calculate the maximum token supply based on collateral value. The maxSupply method is provided to query the current supply cap, ensuring totalSupply never exceeds maxSupply.
Suggested change
This proposal defines a validator role for ERC20-compliant stablecoins and introduces the concept of maximum supply. Validators manage stablecoin collateral and calculate the maximum token supply based on collateral value. The maxSupply method is provided to query the current supply cap, ensuring totalSupply never exceeds maxSupply.
This proposal defines a validator role for [ERC-20](./eip-20.md) compliant stablecoins and introduces the concept of maximum supply. Validators manage stablecoin collateral and calculate the maximum token supply based on collateral value. The `maxSupply` method is provided to query the current supply cap, ensuring `totalSupply` never exceeds `maxSupply`.

ERCS/erc-7924.md Outdated
## Motivation

Most stablecoin issuers are required to hold reserve funds or collateralized assets to back the stablecoin's value. However, existing models lack a mechanism to enforce a supply cap aligned with reserve assets. This EIP aims to:
1. Create a new role to regulate totalSupply.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
1. Create a new role to regulate totalSupply.
1. Create a new role to regulate `totalSupply`.

ERCS/erc-7924.md Outdated
Comment on lines 24 to 26
* `Issuer`: the issuer of the stable coin

* `Validator`: the reserve fund custodians or collateral managers
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* `Issuer`: the issuer of the stable coin
* `Validator`: the reserve fund custodians or collateral managers
* _Issuer_: the issuer of the stable coin
* _Validator_: the reserve fund custodians or collateral managers

Use backticks (`) only for inline code snippets.

ERCS/erc-7924.md Outdated

1. Validator Management
+ Validator address must be publicly verifiable
+ The maximum token supply update operations should contain the statement or receipt from the Validator, such as CAMT052 statement.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

CAMT052

This is not a commonly known term in the Ethereum space. Where is it defined?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

have update the description of CAMT052 statement. which is an ISO 20022 message format used for bank-to-customer intraday account reporting. It provides near real-time transaction details on an account, including both transactions and balances, offering a dynamic view of account activity.

@github-actions
Copy link

The commit c828686 (as a parent of 1f548e9) contains errors.
Please inspect the Run Summary for details.

@github-actions github-actions bot added the w-ci label Jun 25, 2025

1. Validator Management
+ Validator address must be publicly verifiable
+ The maximum token supply update operations should contain the statement or receipt from the Validator, for example ISO 20022 message format used for bank-to-customer intraday account reporting such as CAMT.052 statement.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We do not permit links to (most) ISO standards. They are not free to access, and are therefore incompatible with the open ERC process.

+ The maximum token supply update operations should contain the statement or receipt from the Validator, for example ISO 20022 message format used for bank-to-customer intraday account reporting such as CAMT.052 statement.
+ Validator changes require governance approval
2. Supply Enforcement
+ all mint operations must check:totalSupply() + mintAmount ≤ maxSupply()
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please put code snippets in backticks (`)

+ Validator address must be publicly verifiable
+ The maximum token supply update operations should contain the statement or receipt from the Validator, for example ISO 20022 message format used for bank-to-customer intraday account reporting such as CAMT.052 statement.
+ Validator changes require governance approval
2. Supply Enforcement
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Your markdown syntax for nested lists is a little off here.

Comment on lines +78 to +79
1. Validator Role: Reserve custodians or collateral managers act as validators to ensure supply aligns with asset value.
2. Maximum supply updates: Validators must update maxSupply promptly when collateral or reserve value changes.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Neither of these points really explain why you made a decision, which is what this section is for.

Defining what the validator role is probably belongs in specification, and setting a requirement on their behaviour definitely does.

Instead, use this section to explain why you made particular choices while developing your standard. For example, why you include a data parameter on setMaxSupply.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants