Design Principles

RSM is a Turing-Complete State Machine for Runes Protocol

The RSM is designed based on three principles: security, extension, and consistency. The RSM Contracts must also conform to these three principles.

1. Security

Security is the foundation of all RSM decentralized applications. RSM design needs to consider two aspects: user asset security and application security, including:

  • No custody of user assets

  • Trustless

  • Censorship-resistant

  • Permissionless

  • Token/Application's computing logic is open and transparent

  • Token/Application supports decentralized governance

2. Extension

RSM should have great extension, and can support the logic of currently known decentralized applications and possible future innovations. RSM achieves extension and modularity through the support for token nesting. Applications deployed on RSM can create child applications to utilize the computing capabilities of the child applications, to implement the modularity of building application.

3. Consistency

RSM must meet the consistency requirements, ensuring any indexer can compute a completely consistent state based on the on-chain data in OP_RETURN and the computing logic of the Contract. The RSM Contract consists of two parts: state and state transition function. The state transition function must align with token UTXO operations, which are based on the UTXO model and cannot be extended, to ensure the compatibility and consistency of all Runes tokens. The state is expressed using the state machine model, that requires a rigorous and unambiguous description of the computing logic in the Contract to guarantee the consistency of all the indexers' computing.

Last updated