EIP-7702 vs EIP-3074: AUTH, invokers, and protocol-native delegation

EIP-7702 versus EIP-3074: AUTH and invoker history versus protocol delegation. Trust models, wallet impact, and spec hygiene on Ethereum roadmap. Practical.

2 min read

Who this is for

  • Protocol researchers
  • Wallet architects
  • Auditors

Pros / cons

ProsCons
  • 7702 reflects lessons from prior proposals
  • Clearer path for ecosystem tooling alignment
  • Reduces some footguns relative to early invoker sketches
  • Historical blog posts may confuse newcomers
  • Cross-reference outdated libraries
  • Debate details are easy to misquote

Key takeaways

  • Read current specs, not forum summaries alone
  • Update internal training when roadmap shifts
  • Align smart contract audits with chosen mechanism

Historical context of invoker proposals

Ethereum improvement discussions have long explored ways to let EOAs delegate execution to helper contracts to enable batching, gas sponsorship analogues, or conditional logic without forcing every user through contract wallet deployments. EIP-3074 introduced opcodes such as AUTH and invoker patterns that influenced how wallet developers thought about delegated execution, though full ecosystem adoption faced constraints and debates about trust models and safety. EIP-7702 represents a later iteration shaped by implementation realities, security reviews, and coordination needs across clients, wallets, and exchanges. IBEx documentation avoids presenting either number as a moral victor; instead, it emphasizes what is activated on networks your product actually serves and the concrete semantics users experience. Engineers migrating mental models should re-read authoritative specifications rather than relying on years-old conference slides that may reference superseded details. Academic comparisons can illuminate trade-offs, but production systems require release-note-level precision.

Trust and phishing surfaces compared at a high level

Delegated execution proposals share the property that users may authorize powerful intermediaries; differences lie in opcode-level mechanics, transaction packaging, and how wallets are expected to obtain informed consent. Phishing risk is existential for all approaches if wallets present opaque prompts. IBEx security guidance focuses on consistent human-readable summaries, allowlists for known invokers or designators, and rapid revocation education regardless of which EIP number is in play. Compliance teams may ask whether delegated execution resembles custodial relayers; answers depend on architecture and jurisdiction, not the EIP label alone. Threat intelligence feeds should track abuse campaigns exploiting whichever mechanism is live on valuable chains.

Engineering implications for libraries and hardware wallets

Cryptographic libraries and hardware devices must implement the exact signing digests and transaction encodings for the mechanism chosen by the chain after upgrades. Mixed support across vendors historically fragments user experiences during transition periods. IBEx recommends capability negotiation between dapps, wallets, and signers before entering advanced flows. Automated tests should include vectors from official test suites where available. When deprecating experimental code paths tied to older proposals, remove dead flags to reduce attack surface in wallets. Maintain changelogs that explicitly mention EIP numbers and fork names for future archaeologists.

Strategic guidance for product leaders

Choose features based on user outcomes and measurable metrics like conversion, support load, and loss rates—not based on ideology about account types. Roadmaps should include buffer quarters for unexpected delays in client or hardware support. Communicate honestly with investors about dependencies on core protocol releases. IBEx partners help prioritize minimum viable feature sets that work across majority user environments before chasing edge capabilities. Collect feedback from support tickets to refine messaging; engineers often underestimate confusion caused by similar-sounding acronyms.

Frequently asked questions

Should I implement both 3074 and 7702?

Implement what your target chains actually support post-fork. Dual implementations increase audit and QA cost; avoid unless necessary.

Why do blog posts conflict?

Roadmap evolution over years produces outdated summaries. Prefer specifications tied to specific fork names and client versions.

What is the core shared risk?

Users authorizing powerful delegated execution they do not understand. Invest in UX, monitoring, and education regardless of mechanism.