@jachimikeo
Here’s how a malicious actor can exploit EIP-7702 (or similar smart account behavior):
Step-by-Step Attack Flow:
1. You Sign a Malicious Transaction
The attacker tricks you into signing a crafted message or transaction. This transaction makes your EOA behave like a smart contract during execution.
2. Your Wallet Becomes a Delegate to Malicious Logic
The transaction could include code that uses delegatecall to point to a malicious smart contract. Once delegated, any ERC-20 token sent to your wallet triggers that malicious logic.