How it works
Back to recoveryThis page explains what the site does in plain English, and how we keep it safe. There’s also an Advanced / technical details section below for anyone who wants the exact mechanics.
Plain-English summary
This site helps you move your assets to a new safe wallet smoothly by batching the transfers and sending in a way that the hacker does not expect. You choose what to recover and where it goes.
Your private key never leaves your browser
- We do not send your private key to our server.
- We do not store it in localStorage, IndexedDB, cookies, or logs.
- It stays in memory in your current browser session and is cleared when you refresh/close the page.
- The only thing we send to our server about the compromised wallet is the public address (to look up assets) and signed authorizations (cryptographic proofs), never the key itself.
- If you’re worried about phishing, you can audit the code and run it yourself.
What happens step-by-step
- You paste the compromised wallet’s private key. We derive the public address and create signed recovery authorizations in your browser.
- We look up the wallet’s assets by address. We ask our server to call Zerion for a portfolio scan so you can see and select what you want to recover.
- You choose a destination (“safe wallet”). This is where recovered assets will be sent.
- We compute a quote. It includes the estimated gas cost for the recovery transactions on the networks you’re recovering from with a little buffer to account for gas price fluctuations.
- You pay the quoted gas fees from your safe wallet. This is a normal onchain payment that you approve in your wallet.
- Our server broadcasts the recovery transactions. After payment is confirmed, it submits the recovery transactions on the relevant networks and shows the results.
Advanced / technical details
What data is sent to the server
- Asset discovery: we look up the wallet’s portfolio using Zerion so you can review and select which assets to recover.
- Quote + recovery plan: based on the assets you selected and the networks involved, we compute expected execution costs.
- Execution: after your payment is confirmed, our paymaster broadcasts the recovery transactions. On networks that require it (or where it materially improves success), we route submission through private/encrypted mempool RPCs to reduce interference (e.g. nonce racing by the hacker).
What happens onchain
The recovery uses EIP-7702 authorizations. Your compromised EOA signs an authorization (in your browser) that delegates execution to a recovery contract called UniversalRecoveryDelegate. Our server then broadcasts an EIP-7702 transaction that executes a batch of transfers to the safe address.
The server uses a paymaster to send the signed authorizations. This is why you pay gas fees first: the paymaster covers the execution costs on the destination chains.