diff options
author | Adrián Calvo <adrianclv@gmail.com> | 2017-08-04 20:08:37 +0800 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-08-04 20:08:37 +0800 |
commit | 8d832c7cd36fd0feef1b23701a8eb72316bd468d (patch) | |
tree | da2a41f841b6dc55fc6f3d2727c5db1534270e7b | |
parent | bd9e91085b239323e3280c720135059c5e55cacb (diff) | |
download | dexon-solidity-8d832c7cd36fd0feef1b23701a8eb72316bd468d.tar.gz dexon-solidity-8d832c7cd36fd0feef1b23701a8eb72316bd468d.tar.zst dexon-solidity-8d832c7cd36fd0feef1b23701a8eb72316bd468d.zip |
Removes reference to stack depth attack
Changed the old stack depth attack reference to a generic execution of an untrusted contract to keep the suggestion of the withdrawal pattern.
-rw-r--r-- | docs/solidity-by-example.rst | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/docs/solidity-by-example.rst b/docs/solidity-by-example.rst index 71d27192..dde4495b 100644 --- a/docs/solidity-by-example.rst +++ b/docs/solidity-by-example.rst @@ -277,9 +277,9 @@ activate themselves. if (highestBidder != 0) { // Sending back the money by simply using // highestBidder.send(highestBid) is a security risk - // because it can be prevented by the caller by e.g. - // raising the call stack to 1023. It is always safer - // to let the recipients withdraw their money themselves. + // because it could execute an untrusted contract. + // It is always safer to let the recipients + // withdraw their money themselves. pendingReturns[highestBidder] += highestBid; } highestBidder = msg.sender; |