The code decodes a message and sends Ether to a target address without checking if it is zero.
This could allow an attacker to create a fake signed message that instructs the contract to send Ether to the zero address, which is irreversible and wasteful.
The impact of this vulnerability is that the code could send Ether to the zero address, which is a special address that represents the null pointer or an uninitialized variable. Sending Ether to the zero address is equivalent to burning it, as it can never be recovered or spent by anyone. This could result in a loss of funds for the contract and the users.
slither
you should check that the address is not zero before sending Ether.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.