Recovery & Fallbacks
The Particle CS system includes built-in mechanisms for recovering access in case of key loss or compromise, without introducing centralized trust.
Recovery Role
A designated recovery
address has special capabilities:
Initiate ownership changes
Trigger reconfiguration of critical roles
All actions are subject to the multi-phase delay system
Workflow Example
Owner key is lost or compromised
Recovery role initiates transfer to a new owner
After delay (e.g., 48h), new owner can be approved
Timelock Constraints
Recovery actions must wait the full delay
No shortcut or emergency override allowed
Prevents malicious recovery attempts from executing instantly
Use with Guardians
With GuardianAccountAbstraction
, a recovery can be further delegated to:
Multi-sig delegated group
Social recovery contracts
This adds redundancy and decentralization to recovery logic.
Auditability and Trust
All recovery actions are logged
Cancellable before approval phase
Replay-protected
These features help maintain trust in the system, ensuring that even in extreme cases of loss, there’s a transparent and secure way to regain access.
Last updated