Difficulty -
Medium
Total Plays - 1
Allowed Time - 10 sec
Best time - 10 sec
Why should developers avoid using tx.origin for authentication?
#A
#B
#C
#D
Explanation:
Attackers can trick users into calling a malicious contract. That contract then makes a call where tx.origin equals the victim’s address. This bypasses access control and leads to unauthorized actions.