Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
LABS
Glossary

Recovery Request

A recovery request is a formal, on-chain proposal to transfer control of a smart account, initiated by its designated guardians in a social recovery system.
Chainscore © 2026
definition
BLOCKCHAIN SECURITY

What is a Recovery Request?

A recovery request is a formal proposal to restore access to a digital wallet or smart contract account when the primary private keys are lost or compromised, typically initiated by a designated guardian or through a multi-signature scheme.

In blockchain systems, a recovery request is a critical security mechanism that allows a user to regain control of their assets without relying on a centralized custodian. It is a structured process, often embedded within smart contract wallets or social recovery wallets, where a predefined set of trusted entities or devices must approve the request. This process is fundamentally different from traditional account recovery, as it occurs entirely on-chain through verifiable cryptographic proofs, ensuring transparency and eliminating single points of failure.

The technical implementation typically involves a multi-signature scheme or a guardian model. For example, a user might designate five trusted friends as guardians when setting up their wallet. If the user loses their seed phrase, they initiate an on-chain recovery request. A majority of these guardians (e.g., three out of five) must then cryptographically sign the request to authorize the reassignment of the wallet's signing authority to a new set of private keys. This process ensures that recovery is permissioned and resistant to unilateral attacks.

Recovery requests are a cornerstone of account abstraction and user-friendly security, addressing the critical problem of irreversible key loss. They shift the security model from sole custody, where a single secret must be perfectly managed, to social or institutional trust. Major protocols like Ethereum's ERC-4337 standard for account abstraction natively support such recovery mechanisms, enabling more sophisticated wallet designs that can automate time-locks, governance votes, or biometric verification as part of the recovery flow.

For developers and CTOs, implementing a recovery system requires careful design of the guardian set, approval thresholds, and timelock delays to balance security with usability. A poorly configured system—such as one with too few guardians or no delay period—can itself become a vulnerability. Analysts monitor the adoption and security of these mechanisms as key indicators of blockchain maturity, moving the ecosystem beyond the mantra of 'your keys, your responsibility' to a more resilient 'your community, your recovery' paradigm.

how-it-works
SECURITY MECHANISM

How a Recovery Request Works

A recovery request is a critical security feature in smart contract wallets and decentralized identity systems that allows a user to regain access to their account if they lose their primary private key or signer device.

A recovery request is a transaction initiated by a user or a designated guardian to transfer control of a smart contract wallet or account to a new set of cryptographic keys. This process is essential for account abstraction and social recovery models, where a single lost private key does not result in permanent fund loss. The request is typically submitted to a smart contract that enforces a predefined security policy, such as a multi-signature scheme or a time-delayed approval process involving trusted entities.

The mechanism operates on a challenge-and-verification model. When a request is initiated, it enters a timelock period (e.g., 24-72 hours), during which the existing authorized signers for the account are notified and can veto the request if it appears fraudulent. This delay is a crucial security measure to prevent malicious takeovers. Systems like Ethereum's ERC-4337 for account abstraction or specific smart contract wallets like Safe{Wallet} implement this via modular guardian networks or pre-approved recovery addresses.

For the request to execute successfully, it must satisfy the recovery conditions coded into the smart contract's logic. This often requires a consensus threshold, such as approvals from a majority of a user's designated guardians. Once the timelock expires and the required approvals are met, the contract's ownership or entry point is updated, granting the new key full control. This process decentralizes trust and eliminates single points of failure, moving security from key management to social and procedural safeguards.

In practice, a user who loses their phone (and their seed phrase) would use a secondary device to initiate a recovery request through their wallet's interface. Their guardians—which could be other devices, friends, or institutional services—receive notifications and must approve the request. After the security delay, the wallet's signing logic is reconfigured, and the user accesses their funds with a new key. This model is foundational for mainstream adoption, as it provides a user-friendly safety net akin to traditional account recovery without relying on a central authority.

key-features
MULTI-PARTY COMPUTATION

Key Features of a Recovery Request

A Recovery Request is the formal process for a user to regain access to their assets when a designated guardian is unresponsive or compromised. It is a core security mechanism in smart contract wallets and account abstraction.

01

Time-Locked Execution

A Recovery Request initiates a mandatory security delay (e.g., 24-72 hours) before the recovery action is executed. This cooling-off period prevents unauthorized access by:

  • Allowing the legitimate account owner to cancel the request if it was fraudulent.
  • Giving other guardians time to detect and veto a malicious attempt.
  • Serving as a critical final defense against social engineering or key compromise.
02

Multi-Signature Guardian Approval

Recovery typically requires a cryptographic threshold of approvals from a pre-defined set of guardians. For example, a 3-of-5 scheme where three guardians must sign the request. This ensures:

  • Decentralized trust: No single guardian holds unilateral power.
  • Redundancy: The failure or compromise of one guardian does not lock the user out.
  • Social consensus: Mimics real-world notarization or family recovery processes.
03

Recovery to a New Signer

The ultimate goal of the request is to reassign signing authority from the lost or compromised key to a new, secure cryptographic key pair. This is executed by the smart contract wallet, which updates its internal owner mapping. The process atomically:

  1. Verifies the guardian signatures meet the threshold.
  2. Waits for the security delay to expire.
  3. Permanently sets the new public key as the account's controller.
04

On-Chain Transparency & Audit Trail

Every Recovery Request is a public transaction on the blockchain, creating an immutable audit log. This transparency provides:

  • Verifiability: Anyone can audit the guardian set, thresholds, and request status.
  • Security through visibility: Unusual recovery activity is publicly detectable.
  • Non-repudiation: Guardians cannot deny their participation, as signatures are on-chain.
05

Cancellability by the Account Owner

At any point before the security delay expires, the current valid signer for the account can cancel the pending Recovery Request. This is a crucial user protection feature that:

  • Renders a malicious or mistaken request inert.
  • Empowers the user as the ultimate authority over their account's recovery state.
  • Operates as a simple transaction calling a cancelRecovery function on the wallet contract.
technical-components
RECOVERY REQUEST

Technical Components

A Recovery Request is a formal, on-chain proposal to replace the signers of a smart contract wallet. This section details the core mechanisms and components that make this secure, decentralized process possible.

01

Recovery Request Proposal

The initial on-chain transaction that initiates the recovery process. It is a structured proposal containing:

  • New Signer Set: The cryptographic addresses proposed to replace the lost or compromised signers.
  • Execution Delay: A mandatory waiting period (e.g., 7 days) that allows existing signers to veto the request.
  • Proposer: The address (often a Guardian) that submits the request, which can be a trusted third-party service, a hardware device, or another smart contract.
02

Guardian Role & Veto Power

Guardians are pre-authorized entities (e.g., other wallets, trusted contacts, or services) that can propose a recovery. Crucially, the existing signers of the wallet retain veto power during the execution delay. This creates a security checkpoint, preventing unilateral takeovers. The process is trust-minimized: guardians propose, but only the legitimate owner can cancel by vetoing with their existing keys.

03

Execution Delay (Timelock)

A critical security parameter that enforces a mandatory waiting period between a recovery request being proposed and its execution. This timelock period (often 1-2 weeks) provides a final recourse for the legitimate account owner to detect and cancel a malicious recovery attempt using their existing signer keys. It is the primary defense against attacks on the recovery mechanism itself.

04

Social Recovery vs. Multi-Sig Recovery

Two primary models for structuring recovery requests:

  • Social Recovery: Relies on a decentralized set of off-chain guardians (friends, devices) who cryptographically sign approvals. Popularized by wallets like Argent.
  • Multi-Sig Recovery: Uses an on-chain multi-signature smart contract as the guardian. Recovery requires a threshold of signatures (e.g., 3-of-5) from a pre-defined committee, making the process fully transparent and on-chain.
05

On-Chain Event Logging

Every recovery request emits standardized events on the blockchain (e.g., RecoveryRequested, RecoveryExecuted, RecoveryCanceled). This allows:

  • Wallets & Dashboards to display clear recovery status updates to users.
  • Monitoring Services to alert users of pending actions.
  • Analytics to track recovery mechanism usage and security. The transparency of these logs is fundamental to user awareness and system auditability.
06

Integration with Account Abstraction

Recovery requests are a core feature of ERC-4337 Account Abstraction and smart contract wallets. The recovery logic is embedded within the wallet's smart account code, allowing for:

  • Customizable recovery rules and guardian sets.
  • Gas sponsorship for recovery transactions by paymasters.
  • Batch execution of recovery alongside other operations. This integration moves recovery from a centralized, custodial process to a programmable, non-custodial feature.
WALLET SECURITY MECHANISMS

Recovery Request vs. Seed Phrase Reset

A comparison of two distinct methods for regaining access to a blockchain wallet, differing in security model, user control, and underlying technology.

FeatureRecovery Request (Social Recovery)Seed Phrase Reset

Core Mechanism

Multi-signature approval from pre-defined guardians

Generation of a new, independent cryptographic seed

User Control

Delegated to trusted parties (guardians)

Solely retained by the user

On-Chain Action

Yes, requires a smart contract transaction

No, purely local operation

Original Seed Phrase

Remains valid and unchanged

Permanently invalidated and replaced

Wallet Address

Remains the same

Changes, creating a new address

Asset & History Access

Full access to original assets and transaction history

No access to assets secured by the old seed; fresh wallet state

Typical Use Case

Regain access to a lost or compromised wallet

Abandon a potentially compromised wallet and start fresh

Inherent Trust Assumption

Trust in guardians and the recovery smart contract

Trust in one's own ability to safeguard the new seed phrase

ecosystem-usage
RECOVERY REQUEST

Ecosystem Usage & Standards

A Recovery Request is a standardized mechanism for initiating the recovery of assets from a compromised or lost smart contract wallet, typically requiring approval from a designated set of guardians or a decentralized network.

01

Core Mechanism

A Recovery Request is a formal, on-chain proposal to change the signing authority of a smart account (like an ERC-4337 wallet). It is initiated by a user or a designated guardian and requires a predefined consensus (e.g., a majority of guardians) to execute. This process moves control from a potentially lost private key to a new, secure one.

  • Initiation: Triggered via a specific smart contract function call.
  • Consensus: Uses multi-signature schemes or decentralized oracle networks for approval.
  • Execution: Once validated, the account's entry point updates its ownership.
02

Guardian Networks

Recovery typically relies on a guardian system—a trusted set of entities (individuals, devices, or other contracts) authorized to approve requests. Standards define how these guardians are set, removed, and their voting power.

  • Social Recovery: Friends or family act as guardians (e.g., early Ethereum Name Service designs).
  • Decentralized Guardians: Services like Safe{Wallet}'s RecoveryHub or Etherscan's Permissionless Recovery act as neutral, incentivized networks.
  • Threshold Schemes: Requires M-of-N guardians to sign, preventing single points of failure.
03

ERC-4337 & Smart Accounts

The ERC-4337 standard for account abstraction formalizes recovery as a primary use case. Smart accounts have built-in logic for managing recovery modules.

  • Recovery Modules: Plug-in contracts that handle request logic, separate from core account functions.
  • UserOperations: Recovery actions are bundled as UserOperations and submitted by bundlers to the network.
  • Standardization: Efforts like ERC-6900 (Modular Account Interface) aim to create interoperable recovery plugins across different wallet providers.
04

Security & Delay Periods

To prevent malicious takeovers, recovery implementations include critical security timers and challenges.

  • Security Period: A mandatory waiting window (e.g., 24-72 hours) between request initiation and execution, allowing the original owner to cancel if the request is fraudulent.
  • Challenge Mechanisms: During the delay, anyone can submit proof (e.g., a recent valid signature from the old key) to veto the request.
  • Graceful Degradation: Some systems increase the delay period if guardian turnover is high, adding an extra layer of security.
05

Real-World Implementations

Several major wallet and infrastructure providers have live recovery systems.

  • Safe{Wallet}: Uses a modular RecoveryHub where users can add/remove guardians and set policies.
  • Etherscan Permissionless Recovery: A decentralized service where staked, anonymous "keepers" vote on recovery requests for a fee.
  • Coinbase Smart Wallet: Integrates social recovery flows, allowing recovery via email or trusted contacts.
  • ZeroDev & Stackup: ERC-4337 SDKs that provide built-in recovery module templates for developers.
06

Related Concepts

Understanding recovery requires familiarity with adjacent standards and mechanisms.

  • Account Abstraction (AA): The overarching paradigm enabling programmable recovery logic in smart accounts.
  • Multi-signature (Multisig): A foundational technology where multiple signatures are needed, often used in guardian setups.
  • Session Keys: Temporary signing keys that reduce risk; loss of a session key does not require a full recovery.
  • Fallback Handlers: Designated contracts that can execute specific actions if the primary account is non-responsive, sometimes used in recovery flows.
security-considerations
RECOVERY REQUEST

Security Considerations

A recovery request is a critical security mechanism in social recovery wallets and multi-signature setups, allowing a user to initiate a process to regain access to their assets when primary access is lost. This section details the security implications and best practices surrounding this sensitive operation.

01

The Recovery Request Process

A recovery request is a formal, on-chain proposal to change the signers or guardians of a wallet, initiated when a user loses access to their primary keys. The process typically involves:

  • Initiation: The user (recoverer) submits a request, often with a time-delay (e.g., 1-7 days).
  • Approval: A predefined majority of guardians or co-signers must approve the request.
  • Execution: After the time-delay, the request executes, transferring control to new keys. This delay is a critical security feature, providing a window to cancel fraudulent requests.
02

Guardian Selection & Attack Surface

The security of a recovery request hinges entirely on the integrity of the guardians. Key considerations include:

  • Sybil Resistance: Guardians should be distinct, trusted entities (e.g., family, friends, hardware devices) not controlled by a single party.
  • Social Engineering: Guardians are prime targets for phishing or coercion attacks to approve malicious requests.
  • Decentralization of Trust: Using a diverse set of guardians (personal contacts, institutional services) reduces correlated failure risk. Avoid selecting guardians all from the same social circle or platform.
03

Time-Delay as a Defense

The mandatory time-delay (or waiting period) between request and execution is the primary defense against unauthorized recovery. It serves two purposes:

  • Fraud Detection: Gives the legitimate owner time to discover and cancel a malicious request initiated by a compromised guardian set.
  • Coercion Resistance: Provides a window where a user under duress can alert their network or let the delay expire. The length of the delay is a trade-off between security and convenience; longer delays (e.g., 1 week) are more secure but slower for legitimate recoveries.
04

Cancellation & Monitoring

The ability to cancel a recovery request is as important as initiating one. Users must:

  • Actively Monitor: Use blockchain explorers or alert services to detect unauthorized recovery requests against their wallet address.
  • Maintain a Secure Cancel Key: Retain access to at least one key (even a less-secure one) with cancellation privileges during the delay period.
  • Understand Revocation Rules: Know if cancellation requires a single key or a guardian vote. A system where any guardian can cancel may be vulnerable to denial-of-service attacks against legitimate recovery.
05

Recovery Phishing & Social Engineering

Recovery systems introduce new phishing vectors. Attackers may:

  • Impersonate wallet interfaces to trick users into initiating recovery to attacker-controlled addresses.
  • Pose as legitimate guardians via email or SMS, sending fake approval links to capture signatures.
  • Create fake "recovery services" that require users to surrender guardian details. Defense: Never share recovery secrets or guardian addresses. Always verify transaction details (especially new wallet addresses) on-chain before signing. Use dedicated communication channels with guardians.
06

Inheritance & Long-Term Security

Recovery requests are often part of inheritance planning. This requires special consideration:

  • Documentation: Securely store instructions for heirs on how to initiate recovery, including guardian contacts and steps, without exposing private keys.
  • Guardian Longevity: Choose guardians who will be available and identifiable years later. Consider institutional or professional co-signers for very long-term plans.
  • Legal Wills: The recovery mechanism should be referenced in a legal will, but the cryptographic details (guardian addresses) should be kept separate from the public document to prevent targeted attacks.
RECOVERY REQUEST

Common Misconceptions

Clarifying frequent misunderstandings about the Recovery Request mechanism in social recovery wallets and account abstraction, focusing on its technical operation and security model.

A Recovery Request is a cryptographically signed message that initiates the process of transferring control of a smart contract wallet to a new signing key, authorized by a majority of pre-approved guardians. It works by submitting a transaction to the wallet's smart contract, which verifies the signatures against the guardian set and, upon reaching a predefined threshold, executes the key rotation. This mechanism is a core component of social recovery systems, allowing users to regain access without relying on a single seed phrase. The process is non-custodial; guardians only provide signatures and never hold the assets or the new private key themselves.

RECOVERY REQUEST

Frequently Asked Questions

A Recovery Request is a critical security mechanism in decentralized systems, allowing a user to regain control of their account if they lose access to their primary authentication method, such as a private key or hardware wallet.

A Recovery Request is a formal, on-chain transaction that initiates a process to transfer control of a smart contract wallet or account to a new set of credentials. It is a core feature of social recovery wallets and account abstraction models, designed to mitigate the risk of permanent loss from a lost private key. Unlike a traditional password reset, a recovery is typically a multi-step, time-delayed process that requires approval from a user's pre-selected guardians or recovery committee. This decentralized approach ensures no single entity can unilaterally seize an account, balancing security with user sovereignty.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected direct pipeline
Recovery Request: Definition & Role in Social Recovery | ChainScore Glossary