DeFiFoundry
50,000 USDC
View results
Submission Details
Severity: low
Invalid

Dangerous Usage of tx.origin for authentication leads to

Summary

tx.origin-based protection can be abused by a malicious contract if a legitimate user interacts with the malicious contract.

Vulnerability Details

Using tx.origin may lead to problems when users are interacting via smart contract with GmxProxy protocol. In GmxProxy::setPerpVaultbe used

require(tx.origin == owner(), "not owner");

to validate the owner. However if owner is interacting with some malicious protocol if can lead to a problem

Tools Used

aderyn

Recommendations

use msg.senderin place of tx.origin

Updates

Lead Judging Commences

n0kto Lead Judge 3 months ago
Submission Judgement Published
Invalidated
Reason: Known issue
Assigned finding tags:

invalid_tx-origin

Lightchaser: Medium-5

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.