Multiple contract functions accept zero address inputs without validation, risking incorrect system configuration and potential contract state corruption.
The following functions lack zero address checks:
Test proving vulnerability:
LOW - While not directly exploitable:
Registry could be set to zero address, breaking charity verification
Invalid charities could be registered
Contract state could become inconsistent
Potential issues with future upgrades/migrations
Manual code review
Foundry testing framework
Custom test demonstrating lack of validation
Contract verification tools
Add zero address validation:
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.