Solidity Security Vulnerabilities: Tx.Origin Authentication
Its tempting to use Tx.Origin as a way to verify the original sender of a transaction but this approach is vulnerable to a phishing attack. For example, consider a contract C that only likes to be called by an address A: Now an attacker B can create an innocuous contract B and have A call … Read more