Anthony  pfp
Anthony

@jachimikeo

Here’s how a malicious actor can exploit EIP-7702 (or similar smart account behavior): Step-by-Step Attack Flow: 1. You Sign a Malicious Transaction The attacker tricks you into signing a crafted message or transaction. This transaction makes your EOA behave like a smart contract during execution. 2. Your Wallet Becomes a Delegate to Malicious Logic The transaction could include code that uses delegatecall to point to a malicious smart contract. Once delegated, any ERC-20 token sent to your wallet triggers that malicious logic.
0 reply
0 recast
1 reaction