From e3e9ce53d7c8d5c1228ad7165660c8cb014b0f36 Mon Sep 17 00:00:00 2001 From: Alex Beregszaszi Date: Tue, 25 Sep 2018 17:40:45 +0100 Subject: Set 0.5.x specific example code to be compilable with >0.4.99 <0.6.0 (e.g. 0.5.x only) --- docs/security-considerations.rst | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'docs/security-considerations.rst') diff --git a/docs/security-considerations.rst b/docs/security-considerations.rst index e7c7a0a8..3305c1e1 100644 --- a/docs/security-considerations.rst +++ b/docs/security-considerations.rst @@ -182,7 +182,7 @@ Never use tx.origin for authorization. Let's say you have a wallet contract like :: - pragma solidity >0.4.24; + pragma solidity >0.4.99 <0.6.0; // THIS CONTRACT CONTAINS A BUG - DO NOT USE contract TxUserWallet { @@ -202,7 +202,7 @@ Now someone tricks you into sending ether to the address of this attack wallet: :: - pragma solidity >0.4.24; + pragma solidity >0.4.99 <0.6.0; interface TxUserWallet { function transferTo(address payable dest, uint amount) external; -- cgit