Home   /   Scoring Overview

Scoring Overview

Each proposal is evaluated across defined execution domains.

Each domain is assigned an impact score from 0 to 5, where,

  • 0 represents no observable execution impact
  • 5 represents a material change to protocol execution requiring coordinated adoption and careful deployment

Scores are additive but not prescriptive. Higher total scores indicate increased execution sensitivity and governance attention, not inherent unsuitability.

Domain 1 Execution Semantics Impact

This domain evaluates how the proposal affects QVM’s state transition logic and execution rules.

A low score applies when the proposal introduces no changes to how transactions are executed or how state transitions are computed. Higher scores apply when execution ordering, validation rules, or state mutation logic are altered.

Key considerations include whether execution outcomes remain deterministic, whether new failure modes are introduced, and whether existing contracts observe different execution behavior under identical inputs.

Execution semantics changes are among the most sensitive modifications in QVM, as they directly affect consensus critical behavior.

Domain 2 Determinism and Replay Integrity

This domain measures the proposal’s effect on deterministic execution and historical replay.

A proposal scores low if it preserves strict determinism across nodes and does not introduce new sources of variability. Scores increase if execution depends on additional inputs, timing assumptions, or contextual data that must be carefully constrained.

Reviewers assess whether historical blocks can be replayed to produce identical state, and whether execution traces remain verifiable without reliance on off chain assumptions.

Any degradation in replayability or auditability significantly increases execution impact.

Domain 3 Cryptographic Enforcement Impact

This domain evaluates changes to cryptographic verification enforced by QVM.

Low scores apply when cryptographic primitives, key usage, and signature verification remain unchanged. Higher scores apply when new cryptographic algorithms are introduced, authorization semantics are modified, or key validation rules are altered.

Reviewers consider effects on transaction authorization, validator identity, contract level cryptographic calls, and execution metering for cryptographic operations.

Because cryptography defines trust boundaries, even narrowly scoped changes can carry elevated impact.

Domain 4 Resource Accounting and Performance Impact

This domain assesses how the proposal affects execution cost, throughput, and resource predictability.

Low scores indicate no material change to gas accounting, execution limits, or performance characteristics. Higher scores apply when execution cost models are adjusted, cryptographic operations are added, or state access patterns change.

Reviewers evaluate whether the proposal introduces new worst case execution paths, shifts computational load, or affects validator resource requirements.

Predictable execution cost is a core protocol property and deviations require careful review.

Domain 5 State Structure and Storage Impact

This domain measures changes to how state is structured, stored, or referenced.

Low scores apply when state layout remains unchanged. Higher scores apply when new state roots, storage schemas, or persistent execution artifacts are introduced.

Reviewers consider migration complexity, state growth implications, and compatibility with historical data.

State changes have long term effects on node operation and archival requirements.

Domain 6 PQR Interface Exposure Impact

This domain evaluates how changes propagate to external systems via PQR.

Low scores apply when no PQR interfaces are affected. Higher scores apply when new APIs are introduced, existing interfaces change semantics, or additional execution metadata is exposed.

Reviewers assess whether PQR remains a passive interface layer and whether cryptographic or execution authority is inadvertently shifted outside QVM.

Changes that affect application integration or observability increase coordination requirements.

Domain 7 Backward Compatibility and Migration Impact

This domain evaluates the effect on existing contracts, transactions, and infrastructure.

Low scores apply when existing behavior remains valid without modification. Higher scores apply when breaking changes occur, migrations are required, or versioned execution logic is introduced.

Reviewers consider the clarity of migration guidance, activation conditions, and failure handling.

Backward compatibility directly affects network stability and adoption pacing.

Domain 8 Governance and Deployment Sensitivity

This domain assesses how tightly coupled the proposal is to coordinated governance and deployment processes.

Low scores apply to changes that can be adopted incrementally or are optional. Higher scores apply when network wide upgrades, validator coordination, or strict activation windows are required.

Reviewers consider whether partial adoption could cause inconsistent execution or consensus divergence.

High deployment sensitivity increases governance oversight requirements.

Interpreting Aggregate Scores

Aggregate scores provide a comparative signal, not an approval threshold.

  • Lower aggregate scores typically indicate localized or additive changes
  • Moderate scores suggest protocol sensitive changes requiring structured review
  • Higher scores indicate consensus critical modifications that demand extended review, simulation, and staged deployment

Aggregate scores should be published alongside QIPs to support informed governance discussion.

Regulatory and Oversight Use

For oversight and audit purposes, the scoring model provides a documented method for identifying where protocol execution risk is concentrated. It enables reviewers to trace governance decisions to specific execution domains and assess whether review depth is proportionate to impact.

The model supports consistent evaluation across proposals and establishes a transparent record of how execution changes are assessed prior to adoption.

Summary

The QVM Execution Impact Scoring Model formalizes how execution level changes are evaluated within Quantova. By decomposing execution impact into clearly defined domains, the model supports disciplined governance, predictable deployment, and independent technical review.

It reinforces the principle that changes to execution semantics, cryptography, and state require proportional scrutiny while preserving open participation in protocol evolution.