DeFiFoundry
50,000 USDC
View results
Submission Details
Severity: low
Invalid

Potential use of tx.origin for authentication.

Summary

Using tx.origin may lead to problems when users are interacting via smart contract with your protocol. It is recommended to use msg.sender for authentication.

Vulnerability Details

Found in contracts/GmxProxy.sol ``Line: 352

require(tx.origin == owner(), "not owner");

Impact

  • Vulnerability to phishing attack

  • Potential contract manipulation through malicious intermediate contracts

  • Authentication bypass risks

Recommendations

  • Replace all tx.origin usage with msg.sender

  • Implement proper authentication checks

  • Add additional security layers for critical functions

  • Consider using OpenZeppelin's authentication patterns

Updates

Lead Judging Commences

n0kto Lead Judge 3 months ago
Submission Judgement Published
Invalidated
Reason: Known issue
Assigned finding tags:

invalid_tx-origin

Lightchaser: Medium-5

Support

FAQs

Can't find an answer? Chat with us on Discord, Twitter or Linkedin.