Difficulty -
Medium
Total Plays -
1
Allowed Time - 10 sec
Best Time - --
What is the core risk of using tx.origin for authorization?
#A
#B
#C
#D
Explanation:
tx.origin authorization can be bypassed if a user is tricked into calling an attacker contract, which then calls the target contract—tx.origin remains the user. This is a known insecure pattern in Ethereum security. Interviewers like it because it tests whether candidates understand call chains and why msg.sender + explicit access control is the correct boundary.
Leaderboard
User
Rank
Time Taken
The scoreboard is untouched... just like your gym membership. Come on, get this one right and you're instantly #1.