paint-brush
Hacking Solidity: Contracts Using tx.origin for Authorization Are Vulnerable To Phishingby@kamilpolak
13,144 reads
13,144 reads

Hacking Solidity: Contracts Using tx.origin for Authorization Are Vulnerable To Phishing

by Kamil Polak2mJanuary 16th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow
EN

Too Long; Didn't Read

Contracts that use the 'tx.origin` to authorize users are vulnerable to phishing attacks. The best way to prevent Tx Origin attacks is not to use the `txorigin` for authentication purposes. Instead, it is advisable to use `msg.sender`.
featured image - Hacking Solidity: Contracts Using tx.origin for Authorization Are Vulnerable To Phishing
Kamil Polak HackerNoon profile picture
Kamil Polak

Kamil Polak

@kamilpolak

I am a huge enthusiast of cryptocurrency and blockchain technology.

About @kamilpolak
LEARN MORE ABOUT @KAMILPOLAK'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Kamil Polak HackerNoon profile picture
Kamil Polak@kamilpolak
I am a huge enthusiast of cryptocurrency and blockchain technology.

TOPICS

Languages

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite