The linked function(s) accept address arguments yet do not properly sanitize them.
Impact:
The presence of zero-value addresses, especially in constructor implementations, can cause the contract to be permanently inoperable. These checks are advised as zero-value inputs are a common side-effect of off-chain software related bugs.
Resolved. NOTE: _endpoint is left unsanitized since that variable has a setter method on the contract. The endpoint (in experience) is usually deployed post-deployment of RWAVotingEscrow.sol anyhow.
RWV-01S: Inexistent Sanitization of Input Addresses
Description:
The linked function(s) accept
address
arguments yet do not properly sanitize them.Impact:
The presence of zero-value addresses, especially in
constructor
implementations, can cause the contract to be permanently inoperable. These checks are advised as zero-value inputs are a common side-effect of off-chain software related bugs.Example:
Recommendation:
We advise some basic sanitization to be put in place by ensuring that each
address
specified is non-zero.