Difficulty -
Medium
Total Plays -
11
Allowed Time - 10 sec
Best Time - 3.307
Why should developers avoid using tx.origin for authentication?
#A
#B
#C
#D
Explanation:
Attackers can trick users into calling a malicious contract. That contract then makes a call where tx.origin equals the victim’s address. This bypasses access control and leads to unauthorized actions.
Leaderboard
User
Rank
Time Taken