ERC-8106 - RWA Event-based Compliance Framework

Created 2025-12-16
Status Draft
Category ERC
Type Standards Track
Authors
  • Andrew Wang (@wz14) <zhuowangy2k at outlook.com>

  • Jack Yin (@0xjackey) <0xjackey at gmail.com>

Requires

Abstract

This standard defines an event-based compliance framework for Real World Asset (RWA) tokens on ERC-20, providing:

  1. A standardized entity classification system distinguishing between Compliance Entities (CE) and Decentralized Entities (DE)
  2. Event-driven compliance observation enabling auditability through standardized events and actual value flows, without enforcing hard transaction reverts

This standard is intentionally minimal and does not prescribe business-specific RWA workflows, off-chain settlement mechanisms, minting policies, or specific transfer patterns.

Motivation

Real World Asset tokenization requires compliance observability that existing ERC-20 tokens do not provide:

Missing Capabilities

  1. Entity Classification: No standardized way to distinguish regulated corporate entities from decentralized participants
  2. Compliance Observability: No uniform event semantics for tracking compliance-relevant transfers
  3. Flexible Enforcement: Existing standards use hard reverts, making them incompatible with diverse regulatory frameworks

Why Event-Based?

This standard adopts an event-driven approach rather than enforcement through reverts:

Specification

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 and RFC 8174.

Definitions

Entity Registry

Compliant implementations MUST provide an entity classification registry that assigns each address to one of three categories.

interface IERC8106EntityRegistry {
    enum EntityType { DECENTRALIZED_ENTITY, COMPLIANCE_ENTITY }

    event EntityTypeUpdated(
        address indexed entity,
        EntityType entityType,
        bytes32 indexed reasonHash,
        address indexed operator
    );

    /// @notice Returns the entity type of an address
    /// @dev MUST return DECENTRALIZED_ENTITY for addresses not explicitly registered as COMPLIANCE_ENTITY
    function entityTypeOf(address entity) external view returns (EntityType);
}

Registry Requirements

Implementations MUST satisfy the following requirements:

  1. Default Classification: The entityTypeOf function MUST return DECENTRALIZED_ENTITY for any address not explicitly registered as COMPLIANCE_ENTITY
  2. Explicit Registration: Only addresses explicitly registered SHOULD return COMPLIANCE_ENTITY
  3. Update Events: Entity type changes MUST emit EntityTypeUpdated events
  4. Reason Tracking: The reasonHash parameter MUST reference off-chain documentation (e.g., KYC records, legal entity registration)
  5. Operator Accountability: The operator parameter MUST identify the address that authorized the update

Implementation Note

The registry MAY be: - Embedded within the token contract itself - Implemented as a separate contract referenced by the token - Shared across multiple tokens within an ecosystem

Compliance Events

Compliant implementations MUST emit standardized events that capture compliance-relevant transfer information, including entity classifications, compliance flags, and business correlation identifiers.

interface IERC8106ComplianceEvents is IERC8106EntityRegistry {
    enum ComplianceFlag {
        OK,
        DIRECT_DE_TO_CE,           // DE -> CE observed
        DIRECT_CE_TO_DE,           // CE -> DE observed
        POLICY_CUSTOM              // project-defined policy
    }

    event ComplianceObserved(
        bytes32 indexed bizId,
        address indexed token,     // the ERC-20 token contract address
        address indexed from,
        address to,
        uint256 amount,
        EntityType fromType,
        EntityType toType,
        ComplianceFlag flag,
        bytes32 policyTag          // project-defined categorization tag
    );
}

Event Requirements

Implementations MUST satisfy the following requirements:

  1. Complete Information: Each ComplianceObserved event MUST include all specified parameters
  2. Accurate Classification: The fromType and toType MUST reflect the actual entity types at the time of the transfer
  3. Consistent BizID: All legs of a multi-leg transfer MUST use the same bizId value
  4. Token Identification: The token parameter MUST be the address of the ERC-20 token contract

Recommended Flagging Policy (Non-normative)

Implementations SHOULD apply the following flagging heuristics:

Event-Based Compliance

Implementations SHOULD NOT revert transactions solely based on compliance flags. This event-based approach enables:

Compliance actions (transaction reversals, account freezes, regulatory reporting) SHOULD be handled through separate mechanisms such as:

Rationale

Event-Driven Model

Events rather than reverts because:

Soft Policy Flags

Compliance flags are informational, not enforced:

Auditability Design

Auditors reconstruct transaction flows using:

  1. Value Flows: Every ComplianceObserved event corresponds to a real ERC-20 balance change
  2. Standardized Events: Uniform event structure for machine-readable compliance data
  3. BizID Correlation: Link multiple transfers to a single business transaction

For a given bizId, auditors can query all ComplianceObserved events, build directed graphs from from/to/amount fields, check for direct CE/DE transfers using the flag field, and cross-reference reasonHash with off-chain KYC/AML systems.

Reference Implementation

Implementation Patterns

Embedded Registry: Store entity types in the token contract itself

contract RWAToken is ERC20, IERC8106ComplianceEvents {
    mapping(address => bool) private _isComplianceEntity;

    function entityTypeOf(address entity) public view returns (EntityType) {
        return _isComplianceEntity[entity] 
            ? EntityType.COMPLIANCE_ENTITY 
            : EntityType.DECENTRALIZED_ENTITY;
    }
    // ...
}

Separate Registry: Share registry across multiple tokens

contract EntityRegistry is IERC8106EntityRegistry {
    mapping(address => bool) private _isComplianceEntity;

    function entityTypeOf(address entity) external view returns (EntityType) {
        return _isComplianceEntity[entity]
            ? EntityType.COMPLIANCE_ENTITY
            : EntityType.DECENTRALIZED_ENTITY;
    }

    function registerComplianceEntity(address entity, bytes32 reasonHash) external onlyAdmin {
        _isComplianceEntity[entity] = true;
        emit EntityTypeUpdated(entity, EntityType.COMPLIANCE_ENTITY, reasonHash, msg.sender);
    }
    // ...
}

Policy Tag Conventions: Use consistent hashes for interoperability

bytes32 constant TAG_PAYMENT = keccak256("PAYMENT");
bytes32 constant TAG_TREASURY = keccak256("TREASURY");
bytes32 constant TAG_REFUND = keccak256("REFUND");

Example Use Cases

Compliance Monitoring: A regulated stablecoin tracks all CE↔DE flows for monthly regulatory reports without blocking transactions.

Atomic Multi-Leg Transfers: While not part of this standard, projects can build on these primitives to implement atomic multi-hop transfers:

// User pays → Treasury → Operational account (single transaction)
function purchaseRWA(bytes32 orderId, uint256 amount) external {
    // Leg 1: DE → CE
    token.transferFrom(msg.sender, treasury, amount);
    emit ComplianceObserved(orderId, token, msg.sender, treasury, amount, 
                           DE, CE, DIRECT_DE_TO_CE, TAG_PAYMENT);

    // Leg 2: CE → CE
    token.transferFrom(treasury, operational, amount);
    emit ComplianceObserved(orderId, token, treasury, operational, amount,
                           CE, CE, OK, TAG_TREASURY);
}

This pattern enables single user-facing transactions, unified bizId for audit correlation, and per-leg compliance events.

Time-Delayed Enforcement: Detect suspicious patterns in events, then freeze accounts off-chain or via governance after review.

Security Considerations

Event Integrity: Implementations MUST emit ComplianceObserved events only after actual ERC-20 balance changes. Emitting events without value movement compromises auditability.

Copyright

Copyright and related rights waived via CC0.