1. Existing rules require the originator’s wallet on every on‑chain transfer
• FATF Travel Rule (incorporated into EU Transfer‑of‑Funds Regulation and U.S. FinCEN guidance) obliges intermediaries to record and, when necessary, transmit the originator and beneficiary wallet addresses for virtual‑asset transfers over €1 000.
• MiCA / MiFID‑II pilots and multiple SEC S‑1 filings for tokenised securities stipulate that issuers must be able to trace and, on request, disclose the beneficial owner of each token movement, and most implementations achieve this with an on‑chain allow‑list.
• Current security‑token contracts therefore enforce a simple invariant inside transfer()
:
require(allowList[tx.origin] == true, "sender not authorised");
Without a reliable originator field, the check fails and the token breaches supervisory rules.
2. EIP‑7702 removes the only VM‑level originator signal
Pre‑7702, tx.origin
always equals the signing EOA, so the rule above works even when tokens pass through DEXes or vaults.
Post‑7702, a gas sponsor can be tx.origin
, while the real signer is buried in authorization_list
and never surfaces in the call stack. Once the flow is, for example,
Relayer (tx.origin) → UniswapPool → MorphoVault → SecurityToken.transfer()
no contract in that path (nor any off‑chain monitor) can recover the invisible signer mid‑transaction. The originator requirement is therefore unmet.
3. A one‑line patch (tx.authorizer) fixes the gap with negligible risk
• Clients already call ecrecover
on each authorization_list
element during transaction validation; surfacing the result as a read‑only field (tx.authorizer
) is roughly twenty lines of code in geth and has zero gas impact for legacy transactions.
• ERC‑3651 (“warm COINBASE”) shows that late‑stage, consensus‑safe tweaks are feasible when they avert a systemic problem.
4. Why amending 7702 matters—even though today’s DeFi‑native RWA market is small
Security‑grade RWA tokens on public DeFi are still an emerging niche (< US$100 M TVL) precisely because they rely on the tx.origin
pattern and await broader wallet support.
BlackRock, HSBC‑Orion, BIS blueprints and Coinbase Asset Hub all project hundreds of billions in tokenised bonds and equities migrating to public chains within two to three years, conditional on robust on‑chain enforcement of KYC/KYT rules.
If 7702 lands without an authorizer field:
- New RWA projects will either remain on permissioned chains or build bespoke L2s, slowing Ethereum’s share of the segment.
- The few early‑stage RWA pilots on mainnet will face costly rewrites or migration.
- A future hard‑fork will still be required to add the missing signal—only then it will disrupt a far larger user base.
A trivial patch now prevents the ecosystem from choking off an entire asset class before it scales.
5. Requested next step
Merge the minimal variable tx.authorizer
(or, failing that, defer 7702 to the next fork). This keeps Ethereum aligned with FATF, MiCA and SEC security‑token practices while preserving all usability gains of EIP‑7702. I am available to supply code, test vectors and detailed legal citations as needed.