diff options
author | chriseth <chris@ethereum.org> | 2016-08-16 17:22:24 +0800 |
---|---|---|
committer | GitHub <noreply@github.com> | 2016-08-16 17:22:24 +0800 |
commit | 0c2dc3407560663029c62cc925e6856d8da6c7e3 (patch) | |
tree | 72657edfce7bba5ef9082d556b5afacdea0f3f7a /docs | |
parent | e3e4d84f3353eaaaadae7c1c6eac9e890188d0f8 (diff) | |
download | dexon-solidity-0c2dc3407560663029c62cc925e6856d8da6c7e3.tar.gz dexon-solidity-0c2dc3407560663029c62cc925e6856d8da6c7e3.tar.zst dexon-solidity-0c2dc3407560663029c62cc925e6856d8da6c7e3.zip |
Wording: recursive call exploit -> reentrancy exploit
Diffstat (limited to 'docs')
-rw-r--r-- | docs/control-structures.rst | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/docs/control-structures.rst b/docs/control-structures.rst index e03d8d6a..115a5fd3 100644 --- a/docs/control-structures.rst +++ b/docs/control-structures.rst @@ -82,7 +82,7 @@ parentheses at the end perform the actual call. that the called contract can change state variables of the calling contract via its functions. Write your functions in a way that, for example, calls to external functions happen after any changes to state variables in your contract - so your contract is not vulnerable to a recursive call exploit. + so your contract is not vulnerable to a reentrancy exploit. Named Calls and Anonymous Function Parameters --------------------------------------------- |