• Difficulty - Medium
    Total Plays - 1
    Allowed Time - 10 sec
    Best Time - --

    What is the core risk of using tx.origin for authorization?

    #A
    #B
    #C
    #D
    Explanation:
    tx.origin authorization can be bypassed if a user is tricked into calling an attacker contract, which then calls the target contract—tx.origin remains the user. This is a known insecure pattern in Ethereum security. Interviewers like it because it tests whether candidates understand call chains and why msg.sender + explicit access control is the correct boundary.
    Leaderboard
    User
    Rank
    Time Taken
    The scoreboard is untouched... just like your gym membership. Come on, get this one right and you're instantly #1.