Introduction
A high-level overview of what THORChain is, does, encourages, and pursues.
Last updated
A high-level overview of what THORChain is, does, encourages, and pursues.
Last updated
THORChain is an independent, cross-chain liquidity protocol that operates as a Layer 1 decentralised exchange (DEX). Built on the , it utilises the CometBFT consensus engine, the Cosmos-SDK state machine, and the GG20 Threshold Signature Scheme (TSS) to execute its purpose, which is to allow users to swap native assets across multiple chains with zero reliance on centralised third parties. In doing so, it stands as one of the few exchanges that verifiably ensures transparent and fair prices for cross-chain swaps of native assets.
THORChain's design renders no need for wrapped or pegged assets. Instead, the protocol deploys what are called continuous liquidity pools (CLPs), which—with highly complex algorithms—maximise the efficiency of its transactions. These CLPs allow for THORchain to manage funds directly in on-chain vaults, and it secures those funds via an economic security model. For all this, THORChain might be best described as a "cross-chain automated market maker (AMM), like Uniswap", or even a "decentralised Binance".
Building on the foundation of liquidity pools, THORChain pursues two important financial primitives:
Allow a user to {Asset X on Chain A}, to {Asset Y on Chain B}.
Allow a user to RUNE across liquidity pools,
Developers can create innovative products that integrate with THORChain, including wallets, exchanges, and various services, monetising these efforts via (e.g., up to 10% in affiliate fees for swaps and liquidity additions). All that is needed is a focus on creating engaging front-end interfaces and attracting users.
Developers interested in integrating THORChain should read the , as well as the quick start guide for .
Created with the first principles of decentralisation, resistance to capture, and sustainability, the THORChain protocol includes several novel innovations:
Capped Proof Of Bond: Validator selection keeps the network decentralised and high
3-Day Validator Churning: eliminates validator stagnation, proves spendability of funds, and upgrades the network—all with minimal governance
Asynchronous Network Upgrades: allows validators to upgrade to a new protocol version in their own time; network upgrades occur without ever breaking consensus
Chain-agnostic Bifrost Protocol: handles UTXO, EVM, BFT and Cryptonote chain connections with minimal core-logic nuances
Incentive Pendulum: streams rewards to Validators and Liquidity Providers to target a Network Security ratio that ensures funds are always secured
Continuous Liquidity Pools: allow single-sided liquidity provision, use liquidity-sensitive or "slip-based" fees to resist price attacks
Swap Queue: orders swaps based on price impact in each block, stopping sandwich attacks and most other forms of Miner Extractable Value (MEV)
THORChain contributors work towards three goals:
Security: Perpetually improve the security of the network, via either Functional Security—e.g., Solvency Checker, Node Pause, TxOut Throttler; Procedural Security—e.g., THORSec, Stagenet testing, PR reviews; or Economic Security—e.g., bonded RUNE value
Liquidity: Perpetually increase the liquidity of the network by incentivizing users to deposit into liquidity pools, thereby increasing the network's Total Value Locked (TVL)
Volume: Improve the volume of the network via swap UX and wallet integrations (Quotes Endpoint, Dev UX, BD)
To learn how THORChain works, feel free to jump here:
THORNodes are anonymous individuals who bond their RUNE to the network in order to provide validation services. As a fully permissionless network, THORChain allows anyone with the required funds to do this—all while maintaining user security. To further elevate network security, THORChain maintains a high churn schedule for these validators, every three days kicking out the oldest, slowest, and lowest bonded. This high-churn model ensures that THORChain remains resistant to centralization, capture, and censorship.
Each individual THORNode is comprised of several independent servers in a cluster, which run full-nodes for each connected chain. Initially intended to max out capacity at 100 nodes, the protocol is able scale to 250+ nodes.
THORChain is an open-source, public project with a vibrant and growing ecosystem. Whether you’re a user, an interface developer, or an app builder on top of the network, there’s a way to get involved.
Interface developers are welcome to build wallets, dashboards, exchanges, and more that integrate with THORChain. You can monetize your apps through affiliate fees, earning up to 10% on swaps and liquidity actions. Focus on building great frontends and bringing in users — the protocol takes care of the rest.
Be part of the THORChain ecosystem by joining the . It’s the best place to ask questions, learn how things work, and discuss all things THORChain with other users, builders, and contributors.
Join the to collaborate with other interface developers and access tools, docs, and support. Also see our and quick start guides for .
For building secure and sustainable decentralized applications (dApps) and smart contracts on top of THORChain check out . You can also join the for developers to connect with core contributors and other app developers.