aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAdrián Calvo <adrianclv@gmail.com>2017-08-04 20:08:37 +0800
committerGitHub <noreply@github.com>2017-08-04 20:08:37 +0800
commit8d832c7cd36fd0feef1b23701a8eb72316bd468d (patch)
treeda2a41f841b6dc55fc6f3d2727c5db1534270e7b
parentbd9e91085b239323e3280c720135059c5e55cacb (diff)
downloaddexon-solidity-8d832c7cd36fd0feef1b23701a8eb72316bd468d.tar.gz
dexon-solidity-8d832c7cd36fd0feef1b23701a8eb72316bd468d.tar.zst
dexon-solidity-8d832c7cd36fd0feef1b23701a8eb72316bd468d.zip
Removes reference to stack depth attack
Changed the old stack depth attack reference to a generic execution of an untrusted contract to keep the suggestion of the withdrawal pattern.
-rw-r--r--docs/solidity-by-example.rst6
1 files changed, 3 insertions, 3 deletions
diff --git a/docs/solidity-by-example.rst b/docs/solidity-by-example.rst
index 71d27192..dde4495b 100644
--- a/docs/solidity-by-example.rst
+++ b/docs/solidity-by-example.rst
@@ -277,9 +277,9 @@ activate themselves.
if (highestBidder != 0) {
// Sending back the money by simply using
// highestBidder.send(highestBid) is a security risk
- // because it can be prevented by the caller by e.g.
- // raising the call stack to 1023. It is always safer
- // to let the recipients withdraw their money themselves.
+ // because it could execute an untrusted contract.
+ // It is always safer to let the recipients
+ // withdraw their money themselves.
pendingReturns[highestBidder] += highestBid;
}
highestBidder = msg.sender;