90% of EIP-7702 Delegations Are Malicious: Did Account Abstraction Just Create the Biggest Phishing Vector in Crypto History?
I’ve spent the last 5 years working on wallet UX, and I genuinely believed account abstraction was going to be our breakthrough moment. No more seed phrases. No more “send a test transaction first.” No more grandma losing her life savings because she wrote her recovery phrase on a Post-it note.
And in many ways, it has been a breakthrough. We now have over 200 million smart wallet users globally. Gas sponsorship works. Social recovery works. The UX improvements are real.
But then I saw the Wintermute and GoPlus Security data, and I haven’t slept well since.
The Numbers Are Catastrophic
According to recent security research, over 90% of EIP-7702 delegations observed on-chain are linked to malicious contracts. That’s not a typo. Nine out of ten delegation approvals are scams.
Since the Pectra upgrade rolled out EIP-7702, over 450,000 wallet addresses have been compromised. There’s a documented case of a single victim losing $1.54 million to a phishing site that looked exactly like Uniswap. They signed what appeared to be a normal token swap, and the malicious delegation contract drained their entire wallet in seconds.
How Did This Happen?
For those not deep in the technical weeds: EIP-7702 allows your regular Ethereum wallet (an EOA) to temporarily delegate transaction execution to a smart contract. This is what enables all those cool account abstraction features—gas sponsorship, transaction batching, social recovery.
The problem? When you sign a malicious delegation, you’re essentially turning your wallet into a persistent proxy that unconditionally executes whatever the attacker’s contract tells it to do.
Three ways the attack can trigger:
- You make a transaction (even a benign one to a different protocol)
- The attacker makes an external call to your wallet
- A protocol callback hits your wallet during some unrelated DeFi interaction
And here’s the kicker: Once that delegation is in place, it’s a permanent vulnerability until you actively revoke it. Most users don’t even know they’ve been compromised until their wallet is empty.
The Chain-Agnostic Nightmare
It gets worse. EIP-7702 authorizations can be replayed across multiple chains because EOA nonces evolve independently on each network. Sign one malicious delegation on Ethereum mainnet? Congratulations, attackers can replay that exact signature on Optimism, Base, Arbitrum, and every other EVM chain where your wallet exists.
One phishing signature = cross-chain wallet compromise.
The Paymaster Problem
Paymasters were supposed to make Web3 frictionless by covering gas fees for users. But they’ve also removed the economic barrier that used to protect us from spam attacks.
An attacker can now issue unlimited trigger attempts at near-zero cost. They don’t even need to pay gas—the Paymaster does. We’ve essentially subsidized our own attack vector.
Did We Trade Seed Phrase Security for Social Engineering Vulnerability?
This is what keeps me up at night: Seed phrases were hard to use, but they were resistant to social engineering.
If you had your 12 words written down securely, nobody could trick you into giving up your funds by clicking a “Sign Message” button. The barrier was technical literacy, not human psychology.
Account abstraction flipped that. Now the UX is smooth—too smooth. Users click “Approve” without understanding what they’re delegating. And unlike seed phrases (which required active theft), malicious delegations are persistent remote exploits that sit dormant until triggered.
We went from “lose your keys = lose your funds” to “click the wrong button once = permanent backdoor in your wallet.”
What Do We Do Now?
I’m not saying we should abandon account abstraction. The UX improvements are genuinely life-changing for mainstream adoption. But we cannot ignore that 90% malicious delegation rate.
Some questions for this community:
-
Should wallets disable EIP-7702 delegation features until better security safeguards exist?
-
Can we implement time-limited delegations (expire after X hours) so a single signature doesn’t create permanent risk?
-
Should delegation approvals require multi-step confirmation with explicit warnings about cross-chain replay risks?
-
Do we need wallet-native delegation registries that blacklist known malicious contracts?
-
Or is this a fundamental flaw in the delegation model itself that can’t be fixed with UX improvements?
As someone who has dedicated years to making crypto wallets easier to use, I’m struggling with a hard truth: Maybe we solved the wrong problem.
We optimized for onboarding convenience and assumed users would learn to be careful. But the data shows they won’t—or can’t. The attack surface expanded faster than user education could keep up.
What should wallet developers like me prioritize now? Security that frustrates users? Or UX that leaves them vulnerable?
I honestly don’t know anymore. What do you all think?
Sources: ArXiv EIP-7702 phishing analysis, Wintermute/GoPlus Security data via Relay