Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
Home»HACKING NEWS»zkEmail Email Recovery Audit Summary
HACKING NEWS

zkEmail Email Recovery Audit Summary

By Crypto FlexsOctober 13, 20244 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
zkEmail Email Recovery Audit Summary
Share
Facebook Twitter LinkedIn Pinterest Email

ZK Email Account Recovery module enables smart account recovery through decentralized email guardians. Compatible with ERC-7579 and 4337, but can also be used natively. The recovery process involves adding your email address as a guardian, which can be used to recover your account if you lose your private key by simply sending an email with your new public key.

ZK Email In collaboration with Ackee Blockchain Security, we conducted a security review of email recovery from ZK Email for a total of 8 engineering days from July 4 to July 12, 2024.

methodology

We began our review using static analysis tools, including: awake. We then took a closer look at the logic of the contract. Used Wake testing framework for testing and fuzzing. During the review process, we paid special attention to the following:

  • Check the initialization and configuration process of the recovery module,
  • Ensure appropriate care of caregiver status,
  • Check event emission consistency and completeness
  • Ensure gas optimization and efficiency of smart contract operations;
  • interaction with ERC-7579 standard,
  • Detect possible reentrancy in your code,
  • Ensure access controls are neither too relaxed nor too strict
  • I’m looking for common problems like data validation.

range

An audit has been performed on the commit. 4e70316 The exact scope was the following files:

  • ./EmailRecoveryManager.sol
  • ./modules/EmailRecoveryModule.sol
  • ./modules/UniversalEmailRecoveryModule.sol
  • ./handlers/EmailRecoverySubjectHandler.sol
  • ./libraries/EnumerableGuardianMap.sol
  • ./libraries/GuardianUtils.sol
  • ./handlers/SafeRecoverySubjectHandler.sol
  • ./factories/EmailRecoveryFactory.sol
  • ./factories/EmailRecoveryUniversalFactory.sol

Findings

The audit results are as follows:

critical severity

No critical severity issues were found.

Severity High

H1: Multiple vulnerabilities in the recovery configuration process

H2: Update early caregiver composition addGuardian function

medium severity

M1: templateIdx The function parameter resolution is in the wrong place.

M2: Maximum Guardian DoS

M3: Selector conflict UniversalEmailRecoveryModule

M4: You can configure up to + 1 validator. UniversalEmailRecoveryModule

M5: UniversalRecoveryModule Random safe recovery calls

low severity

L1: Validators can be added/removed before module initialization. UniversalEmailRecovery

L2: UniversalEmailRecovery Once removed, a validator cannot be rejected.

L3: cancelRecovery Functionality is not reverted when recovery is not in progress.

warning severity

W1: isInitialized If initialized without a guardian, the function returns false.

W2: Not used bytes32 function parameters EmailRecoveryManager

W3: Unnecessary calculations calldataHash give value validateRecoverySubject function

W4: Gas inefficiency UniversalRecoveryModule

W5: Event with missing parameter

W6: missing AddedGuardian event emission setupGuardians function

W7: ERC-4337 violation onInstall

Information Severity

I1: getTrustedRecoveryManager The function returns a public variable. emailRecoveryManager

I2: immutable state variable EmailRecoveryManager contract

I3: Misleading naming

I4: Unchecked return value EnumerableGuardianMap library

I5: Enabled calldata approval memory In function parameters

I6: Floating Pragma

I7: Missing zero address validation in constructor.

I8: No modifier above constructor

I9: Safety validateRecoverySubject Optimization

I10: Unused using-for directive

conclusion

Our review resulted in 27 findings ranging from High to Informational severity across revisions 1.0 – 1.2. The most serious issue (H1) arises from the ability to initialize the system without a guardian and a zero threshold, which can lead to misconfigurations and inconsistent guardian states. Another high severity issue (H2) refers to premature updating of the guardian configuration in the addGuardian function. This can lead to situations where the totalWeight value (the sum of the guardian weights) does not accurately reflect the total weight of the allowed guardians. It makes recovery impossible. Additionally, there are three medium severity issues related to the module’s validator configuration and custom template support. The code also contains several lower severity issues with warnings/information, which are mostly minor mistakes that are overlooked.

Ackee Blockchain Security recommends ZK email.

  • Do not allow system wipes without a guardian and with a threshold of 0.
  • Make sure the system accurately tracks the weighted totals of approved guardians.
  • Optimize the gas usage of your contract,
  • Addresses all other reported issues.

You can find Ackee Blockchain Security’s full ZK Email Audit report, which includes a detailed description of all findings and recommendations. here.

We are delighted to have appreciated ZK Email and look forward to working together again.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Message signatures in wake tests: EIP-712, EIP-191, and hashes

December 14, 2025

Ghouls can be guardians too

December 12, 2025

Silk Road cryptocurrency activity has resurfaced as dormant Bitcoin wallets become active again.

December 10, 2025
Add A Comment

Comments are closed.

Recent Posts

Gensyn Launches $AI Token Sale On Sonar

December 15, 2025

Aster Launches Shield Mode, A Protected High-Performance Trading Mode For On-Chain Traders

December 15, 2025

Geode Lists GEODE Coin On BitMart.com As Part Of Ongoing Decentralized Infrastructure Expansion

December 15, 2025

METH Protocol Accelerates Fast, On-Demand ETH Redemptions And Yield Deployment Via Buffer Pool Enhancement

December 15, 2025

Esports Betting with Cryptocurrency: Bitcoin Betting Platform Built for CS2, LoL, and Valorant

December 15, 2025

Cryptocurrency Regulation Enters the “Banking Era” With the Emergence of Trust Banks, How Can Ordinary People Seize the Next Wave of Compliance Benefits?

December 15, 2025

What is stability? – Bitfinex Blog

December 14, 2025

Solana price is stuck in a narrow range awaiting a clear catalyst.

December 14, 2025

Message signatures in wake tests: EIP-712, EIP-191, and hashes

December 14, 2025

New Pre-Market Phase Ahead Of TGE

December 14, 2025

Phantom integrates the Kalshi prediction market as cryptocurrency wallets expand into event trading.

December 14, 2025

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

Gensyn Launches $AI Token Sale On Sonar

December 15, 2025

Aster Launches Shield Mode, A Protected High-Performance Trading Mode For On-Chain Traders

December 15, 2025

Geode Lists GEODE Coin On BitMart.com As Part Of Ongoing Decentralized Infrastructure Expansion

December 15, 2025
Most Popular

Solana (SOL) New Phishing Scam Leads to Over $4,000,000 in Cryptocurrency Assets Stolen: Security Firm

January 16, 2024

Can Bitcoin challenge lifetime highs again?

May 15, 2024

Spot Bitcoin ETF Token Presale Surpasses $200,000 – Blockchain News, Opinion, TV & Jobs

May 6, 2024
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.