Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
Home»HACKING NEWS»zkEmail Email Recovery Audit Summary
HACKING NEWS

zkEmail Email Recovery Audit Summary

By Crypto FlexsOctober 13, 20244 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
zkEmail Email Recovery Audit Summary
Share
Facebook Twitter LinkedIn Pinterest Email

ZK Email Account Recovery module enables smart account recovery through decentralized email guardians. Compatible with ERC-7579 and 4337, but can also be used natively. The recovery process involves adding your email address as a guardian, which can be used to recover your account if you lose your private key by simply sending an email with your new public key.

ZK Email In collaboration with Ackee Blockchain Security, we conducted a security review of email recovery from ZK Email for a total of 8 engineering days from July 4 to July 12, 2024.

methodology

We began our review using static analysis tools, including: awake. We then took a closer look at the logic of the contract. Used Wake testing framework for testing and fuzzing. During the review process, we paid special attention to the following:

  • Check the initialization and configuration process of the recovery module,
  • Ensure appropriate care of caregiver status,
  • Check event emission consistency and completeness
  • Ensure gas optimization and efficiency of smart contract operations;
  • interaction with ERC-7579 standard,
  • Detect possible reentrancy in your code,
  • Ensure access controls are neither too relaxed nor too strict
  • I’m looking for common problems like data validation.

range

An audit has been performed on the commit. 4e70316 The exact scope was the following files:

  • ./EmailRecoveryManager.sol
  • ./modules/EmailRecoveryModule.sol
  • ./modules/UniversalEmailRecoveryModule.sol
  • ./handlers/EmailRecoverySubjectHandler.sol
  • ./libraries/EnumerableGuardianMap.sol
  • ./libraries/GuardianUtils.sol
  • ./handlers/SafeRecoverySubjectHandler.sol
  • ./factories/EmailRecoveryFactory.sol
  • ./factories/EmailRecoveryUniversalFactory.sol

Findings

The audit results are as follows:

critical severity

No critical severity issues were found.

Severity High

H1: Multiple vulnerabilities in the recovery configuration process

H2: Update early caregiver composition addGuardian function

medium severity

M1: templateIdx The function parameter resolution is in the wrong place.

M2: Maximum Guardian DoS

M3: Selector conflict UniversalEmailRecoveryModule

M4: You can configure up to + 1 validator. UniversalEmailRecoveryModule

M5: UniversalRecoveryModule Random safe recovery calls

low severity

L1: Validators can be added/removed before module initialization. UniversalEmailRecovery

L2: UniversalEmailRecovery Once removed, a validator cannot be rejected.

L3: cancelRecovery Functionality is not reverted when recovery is not in progress.

warning severity

W1: isInitialized If initialized without a guardian, the function returns false.

W2: Not used bytes32 function parameters EmailRecoveryManager

W3: Unnecessary calculations calldataHash give value validateRecoverySubject function

W4: Gas inefficiency UniversalRecoveryModule

W5: Event with missing parameter

W6: missing AddedGuardian event emission setupGuardians function

W7: ERC-4337 violation onInstall

Information Severity

I1: getTrustedRecoveryManager The function returns a public variable. emailRecoveryManager

I2: immutable state variable EmailRecoveryManager contract

I3: Misleading naming

I4: Unchecked return value EnumerableGuardianMap library

I5: Enabled calldata approval memory In function parameters

I6: Floating Pragma

I7: Missing zero address validation in constructor.

I8: No modifier above constructor

I9: Safety validateRecoverySubject Optimization

I10: Unused using-for directive

conclusion

Our review resulted in 27 findings ranging from High to Informational severity across revisions 1.0 – 1.2. The most serious issue (H1) arises from the ability to initialize the system without a guardian and a zero threshold, which can lead to misconfigurations and inconsistent guardian states. Another high severity issue (H2) refers to premature updating of the guardian configuration in the addGuardian function. This can lead to situations where the totalWeight value (the sum of the guardian weights) does not accurately reflect the total weight of the allowed guardians. It makes recovery impossible. Additionally, there are three medium severity issues related to the module’s validator configuration and custom template support. The code also contains several lower severity issues with warnings/information, which are mostly minor mistakes that are overlooked.

Ackee Blockchain Security recommends ZK email.

  • Do not allow system wipes without a guardian and with a threshold of 0.
  • Make sure the system accurately tracks the weighted totals of approved guardians.
  • Optimize the gas usage of your contract,
  • Addresses all other reported issues.

You can find Ackee Blockchain Security’s full ZK Email Audit report, which includes a detailed description of all findings and recommendations. here.

We are delighted to have appreciated ZK Email and look forward to working together again.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Cryptocurrency Wills and Trusts – Vault12

January 5, 2026

Automated wallet leaks raise new cryptocurrency security concerns across the EVM network.

January 3, 2026

ASTER price outlook as whale loses 3 million coins

January 1, 2026
Add A Comment

Comments are closed.

Recent Posts

BTC Forge Introduces A New Era Of Cloud Mining, Enabling To Earn Bitcoin Passively Without Hardware

January 7, 2026

Coinhub Exchange Brings A Bank-Like Crypto Experience To Las Vegas And Phoenix

January 6, 2026

Bybit’s 2026 Crypto Outlook Challenges The Four-Year Crypto Cycle

January 6, 2026

As a bullish reversal pattern is formed ahead of the Fermi hard fork, BNB price is targeting $1,000.

January 6, 2026

Phemex Catalyzes 2026 Market Momentum With Dual Strategic Initiatives For Trader Empowerment

January 6, 2026

Mixed signals for Ethereum: Technical milestones and growing adoption offset market pressure

January 6, 2026

AAVE price prediction: $185-195 recovery target in 2-4 weeks

January 6, 2026

Cryptocurrency Wills and Trusts – Vault12

January 5, 2026

Taisu Ventures And Keio FinTEK Center Launch Keio ChainHack 2026 Focused On Web3 Innovation

January 5, 2026

SlotGPT launches new AI slots platform that turns players into creators

January 5, 2026

Bitcoin price rises 1.5% as Bitcoiners celebrate Genesis Day

January 4, 2026

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

BTC Forge Introduces A New Era Of Cloud Mining, Enabling To Earn Bitcoin Passively Without Hardware

January 7, 2026

Coinhub Exchange Brings A Bank-Like Crypto Experience To Las Vegas And Phoenix

January 6, 2026

Bybit’s 2026 Crypto Outlook Challenges The Four-Year Crypto Cycle

January 6, 2026
Most Popular

The reason why the analysts believe that Q2 is a good opportunity to buy altcoin

April 5, 2025

Stablecoin trial conducted with participants including Hong Kong, Standard Chartered Bank, and Animoca Brands

July 19, 2024

Bitcoin’s ‘euphoria phase’ has cooled off, but BTC bottom could be near — Glassnode

April 30, 2024
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2026 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.