Hacking Solidity: Contracts Using tx.origin for Authorization Are Vulnerable To Phishing
Too Long; Didn't Read
Contracts that use the 'tx.origin` to authorize users are vulnerable to phishing attacks. The best way to prevent Tx Origin attacks is not to use the `txorigin` for authentication purposes. Instead, it is advisable to use `msg.sender`.