Impersonator
Call a specific function on the target contract, making it appear as if the call originated from a required, privileged address.
Vulnerable Code
Analyze the Solidity code below to find the vulnerability.
Submit Explanation
Explain the vulnerability and how to exploit it.
Hints (5)
Just a little peak
Hint 1
Hint 2
Hint 3
Hint 4
Hint 5
Explanation
Discomfort = Learning