Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • ADOPTION
  • TRADING
  • HACKING
  • SLOT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • ADOPTION
  • TRADING
  • HACKING
  • SLOT
Crypto Flexs
Home»HACKING NEWS»zkEmail Email Recovery Audit Summary
HACKING NEWS

zkEmail Email Recovery Audit Summary

By Crypto FlexsOctober 13, 20244 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
zkEmail Email Recovery Audit Summary
Share
Facebook Twitter LinkedIn Pinterest Email

ZK Email Account Recovery module enables smart account recovery through decentralized email guardians. Compatible with ERC-7579 and 4337, but can also be used natively. The recovery process involves adding your email address as a guardian, which can be used to recover your account if you lose your private key by simply sending an email with your new public key.

ZK Email In collaboration with Ackee Blockchain Security, we conducted a security review of email recovery from ZK Email for a total of 8 engineering days from July 4 to July 12, 2024.

methodology

We began our review using static analysis tools, including: awake. We then took a closer look at the logic of the contract. Used Wake testing framework for testing and fuzzing. During the review process, we paid special attention to the following:

  • Check the initialization and configuration process of the recovery module,
  • Ensure appropriate care of caregiver status,
  • Check event emission consistency and completeness
  • Ensure gas optimization and efficiency of smart contract operations;
  • interaction with ERC-7579 standard,
  • Detect possible reentrancy in your code,
  • Ensure access controls are neither too relaxed nor too strict
  • I’m looking for common problems like data validation.

range

An audit has been performed on the commit. 4e70316 The exact scope was the following files:

  • ./EmailRecoveryManager.sol
  • ./modules/EmailRecoveryModule.sol
  • ./modules/UniversalEmailRecoveryModule.sol
  • ./handlers/EmailRecoverySubjectHandler.sol
  • ./libraries/EnumerableGuardianMap.sol
  • ./libraries/GuardianUtils.sol
  • ./handlers/SafeRecoverySubjectHandler.sol
  • ./factories/EmailRecoveryFactory.sol
  • ./factories/EmailRecoveryUniversalFactory.sol

Findings

The audit results are as follows:

critical severity

No critical severity issues were found.

Severity High

H1: Multiple vulnerabilities in the recovery configuration process

H2: Update early caregiver composition addGuardian function

medium severity

M1: templateIdx The function parameter resolution is in the wrong place.

M2: Maximum Guardian DoS

M3: Selector conflict UniversalEmailRecoveryModule

M4: You can configure up to + 1 validator. UniversalEmailRecoveryModule

M5: UniversalRecoveryModule Random safe recovery calls

low severity

L1: Validators can be added/removed before module initialization. UniversalEmailRecovery

L2: UniversalEmailRecovery Once removed, a validator cannot be rejected.

L3: cancelRecovery Functionality is not reverted when recovery is not in progress.

warning severity

W1: isInitialized If initialized without a guardian, the function returns false.

W2: Not used bytes32 function parameters EmailRecoveryManager

W3: Unnecessary calculations calldataHash give value validateRecoverySubject function

W4: Gas inefficiency UniversalRecoveryModule

W5: Event with missing parameter

W6: missing AddedGuardian event emission setupGuardians function

W7: ERC-4337 violation onInstall

Information Severity

I1: getTrustedRecoveryManager The function returns a public variable. emailRecoveryManager

I2: immutable state variable EmailRecoveryManager contract

I3: Misleading naming

I4: Unchecked return value EnumerableGuardianMap library

I5: Enabled calldata approval memory In function parameters

I6: Floating Pragma

I7: Missing zero address validation in constructor.

I8: No modifier above constructor

I9: Safety validateRecoverySubject Optimization

I10: Unused using-for directive

conclusion

Our review resulted in 27 findings ranging from High to Informational severity across revisions 1.0 – 1.2. The most serious issue (H1) arises from the ability to initialize the system without a guardian and a zero threshold, which can lead to misconfigurations and inconsistent guardian states. Another high severity issue (H2) refers to premature updating of the guardian configuration in the addGuardian function. This can lead to situations where the totalWeight value (the sum of the guardian weights) does not accurately reflect the total weight of the allowed guardians. It makes recovery impossible. Additionally, there are three medium severity issues related to the module’s validator configuration and custom template support. The code also contains several lower severity issues with warnings/information, which are mostly minor mistakes that are overlooked.

Ackee Blockchain Security recommends ZK email.

  • Do not allow system wipes without a guardian and with a threshold of 0.
  • Make sure the system accurately tracks the weighted totals of approved guardians.
  • Optimize the gas usage of your contract,
  • Addresses all other reported issues.

You can find Ackee Blockchain Security’s full ZK Email Audit report, which includes a detailed description of all findings and recommendations. here.

We are delighted to have appreciated ZK Email and look forward to working together again.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

VFAT SICKLE Audit Summary -Ackee Blockchain

May 16, 2025

Protecting Your Ass(ets) – Vault12

May 12, 2025

How to claim vault12 promotional code for Android and iOS

May 10, 2025
Add A Comment

Comments are closed.

Recent Posts

Dogecoin Active addresses 990%of Skyrockets a week

May 16, 2025

NVIDIA enhances path tracking in Indiana Jones Games with opaque microfatmap and BLAS compression.

May 16, 2025

BTCS Inc., a blockchain that raises $ 57.8 million to buy Ether Leeum Effects of -ETH?

May 16, 2025

$ 1.2 billion in ETH EXITS exchange

May 16, 2025

AI unveils major Alzheimer’s genes and potential treatment.

May 16, 2025

Solana Network Activity Surge and ‘Megaphone’ Chart Pattern Set $ ​​210 SOL Trame Target

May 16, 2025

VFAT SICKLE Audit Summary -Ackee Blockchain

May 16, 2025

Is the US PPI a surge in 2.4%, Bitcoin and Altcoin?

May 16, 2025

GeForce is now expanded to ‘Doom: The Dark Ages’.

May 16, 2025

As Momentum faces important tests, Solana is seeing the return of investors.

May 16, 2025

Solana Network Activity Surge and ‘Megaphone’ Chart Pattern Set $ ​​210 SOL Trame Target

May 16, 2025

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

Dogecoin Active addresses 990%of Skyrockets a week

May 16, 2025

NVIDIA enhances path tracking in Indiana Jones Games with opaque microfatmap and BLAS compression.

May 16, 2025

BTCS Inc., a blockchain that raises $ 57.8 million to buy Ether Leeum Effects of -ETH?

May 16, 2025
Most Popular

Changelog: Version 1.82 – Bitfinex Blog

December 29, 2023

SEC Commissioner Hester Peirce condemned SAB 121 and criticized the agency’s regulatory approach.

April 2, 2024

NVIDIA Powers AI Inference with Full-Stack Solutions

January 26, 2025
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.