mirror of
https://github.com/ethereum/solidity
synced 2023-10-03 13:03:40 +00:00
Incorporate corrections
This commit is contained in:
parent
811980afe6
commit
ab3531ffc3
@ -76,8 +76,8 @@ parentheses at the end perform the actual call.
|
|||||||
do just about anything. Be prepared in case it calls into other contracts of
|
do just about anything. Be prepared in case it calls into other contracts of
|
||||||
your system or even back into the calling contract before the first
|
your system or even back into the calling contract before the first
|
||||||
call returns. This means
|
call returns. This means
|
||||||
that the called contract can change the state variables of the calling contract
|
that the called contract can change state variables of the calling contract
|
||||||
via its functions. Write your functions in a way that such that, for example, calls to
|
via its functions. Write your functions in a way that, for example, calls to
|
||||||
external functions happen after any changes to state variables in your contract
|
external functions happen after any changes to state variables in your contract
|
||||||
so your contract is not vulnerable to a recursive call exploit.
|
so your contract is not vulnerable to a recursive call exploit.
|
||||||
|
|
||||||
|
@ -129,7 +129,7 @@ Callstack Depth
|
|||||||
===============
|
===============
|
||||||
|
|
||||||
External function calls can fail any time because they exceed the maximum
|
External function calls can fail any time because they exceed the maximum
|
||||||
call stack of 1023. In such situations, Solidity throws an exception.
|
call stack of 1024. In such situations, Solidity throws an exception.
|
||||||
Malicious actors might be able to force the call stack to a high value
|
Malicious actors might be able to force the call stack to a high value
|
||||||
before they interact with your contract.
|
before they interact with your contract.
|
||||||
|
|
||||||
@ -185,7 +185,7 @@ because of the re-entrancy problem explained above.
|
|||||||
Note that, also, calls to known contracts might in turn cause calls to
|
Note that, also, calls to known contracts might in turn cause calls to
|
||||||
unknown contracts, so it is probably better to just always apply this pattern.
|
unknown contracts, so it is probably better to just always apply this pattern.
|
||||||
|
|
||||||
Include a Fail-safe Mode
|
Include a Fail-Safe Mode
|
||||||
========================
|
========================
|
||||||
|
|
||||||
While making your system fully decentralised will remove any intermediary,
|
While making your system fully decentralised will remove any intermediary,
|
||||||
|
Loading…
Reference in New Issue
Block a user