Recovery & Fallbacks

The Particle CS system includes built-in mechanisms for recovering access in case of key loss or compromise, without introducing centralized trust.

Recovery Role

A designated recovery address has special capabilities:

  • Initiate ownership changes

  • Trigger reconfiguration of critical roles

  • All actions are subject to the multi-phase delay system

Workflow Example

  1. Owner key is lost or compromised

  2. Recovery role initiates transfer to a new owner

  3. After delay (e.g., 48h), new owner can be approved

Timelock Constraints

  • Recovery actions must wait the full delay

  • No shortcut or emergency override allowed

  • Prevents malicious recovery attempts from executing instantly

Use with Guardians

With GuardianAccountAbstraction, a recovery can be further delegated to:

  • Multi-sig delegated group

  • Social recovery contracts

This adds redundancy and decentralization to recovery logic.

Auditability and Trust

  • All recovery actions are logged

  • Cancellable before approval phase

  • Replay-protected

These features help maintain trust in the system, ensuring that even in extreme cases of loss, there’s a transparent and secure way to regain access.

Last updated