ERC-7579 minimal modular accounts: modules, fallbacks, and AA integration

ERC-7579 minimal modules: install, remove, types, governance. Pair module policy with EIP-4337 UserOperations and observability. Practical notes for IBEx.

2 min read

Who this is for

  • Smart account developers
  • Auditors
  • Infrastructure integrators

Pros / cons

ProsCons
  • Aims for lean interfaces and interoperability
  • Supports multiple module types in one framework
  • Encourages clear lifecycle methods
  • Ecosystem still maturing relative to monolithic wallets
  • Misconfigured modules remain a top risk
  • Requires rigorous testing matrices

Key takeaways

  • Treat modules as first-class supply chain artifacts
  • Automate install/remove simulations in CI
  • Segment analytics by module set

Minimal modular account philosophy

ERC-7579 proposes a minimal interface for modular smart accounts, emphasizing small, well-defined extension points rather than prescribing entire wallet monoliths. Modules may participate in validation, execution, or fallbacks depending on the typed interfaces exposed by the account implementation. The minimalism is intentional: it seeks to reduce audit combinatorics by keeping core account logic small while pushing feature growth into modules with explicit permissions. IBEx Network teams align with this philosophy when advising startups to ship a narrow audited core and add capabilities through gated modules rather than expanding bytecode ad hoc. Interoperability improves when multiple vendors implement the same module lifecycle methods, enabling marketplaces and reusable tooling. However, minimalism does not imply simplicity for end users; wallets must still translate module permissions into comprehensible consent experiences. Documentation should distinguish between module types so integrators know which hooks run during validation versus execution, a distinction critical under EIP-4337 constraints.

Module installation, removal, and governance

Installing a module is a security-sensitive transaction comparable to changing account policy. Removal paths must handle cases where a module is malicious and attempts to block uninstallation; accounts should include guardian or timelock procedures tested in adversarial scenarios. Governance structures for enterprises may require multisig approval for module changes with separate emergency councils for incident response. IBEx deployments sometimes integrate policy oracles that record module changes in SIEM systems for compliance. Version pinning ensures that upgrades reference audited bytecode hashes rather than mutable metadata. User interfaces should show module addresses, version labels, and capabilities at signing time. Support teams need lookup tools that map module addresses to vendor documentation quickly.

Combining ERC-7579 modules with EIP-4337 operations

UserOperations trigger validateUserOp and execution entrypoints on the account, which then delegate to modules according to internal routing. Gas estimation must include module validation hooks that execute during the validation phase, respecting opcode and storage limitations. Failure isolation matters: a buggy module should not brick the entire account if design allows fallback to owner paths, though achieving that property requires careful architecture. IBEx recommends trace-driven testing where module-heavy operations are compared against baseline accounts on identical calldata. Paymasters should understand when modules affect fee logic, such as session keys with restricted value limits. Analytics pipelines should tag module configurations to interpret changes in revert rates after releases.

Security testing and audit collaboration

Auditors benefit from module dependency graphs, threat models for cross-module interactions, and explicit invariants documented by wallet teams. Property tests can assert that modules cannot escalate beyond advertised capabilities, at least for well-scoped interfaces. Formal methods may target validation hooks where bugs have outsized impact. IBEx security partners encourage publishing audit summaries per module release with diff notes. Red teams should attempt composite attacks combining social engineering of owners with technically valid module installs. Bug bounty programs should include module-specific scopes with clear payout guidelines. Long term, industry-wide registries of module reputations could help wallets warn users before installation, though privacy and gaming concerns must be addressed.

Frequently asked questions

How does ERC-7579 relate to ERC-6900?

Both pursue modular smart accounts but with different interface philosophies. Evaluate ecosystem SDK support and auditor familiarity when choosing.

Can I mix module standards in one account?

Generally not without custom adapters. Mixing increases complexity and audit cost substantially.

What is the top module risk?

Overprivileged execution hooks that move assets or change owners without clear user understanding. Consent UX and allowlists mitigate this.