mirror of
https://github.com/ethereum/solidity
synced 2023-10-03 13:03:40 +00:00
Small clean up on call stack section
Spelling, clarified what items go to the call stack and how any attack is executed
This commit is contained in:
parent
a39aae8604
commit
f6b403581e
@ -181,13 +181,14 @@ Sending and Receiving Ether
|
||||
contract. Again, the best practice here is to use a :ref:`"withdraw"
|
||||
pattern instead of a "send" pattern <withdrawal_pattern>`.
|
||||
|
||||
Callstack Depth
|
||||
===============
|
||||
Call stack Depth
|
||||
================
|
||||
|
||||
External function calls can fail any time because they exceed the maximum
|
||||
call stack of 1024. In such situations, Solidity throws an exception.
|
||||
Malicious actors might be able to force the call stack to a high value
|
||||
before they interact with your contract.
|
||||
before they interact with your contract, by controlling the number of calls
|
||||
and local function variables on the stack.
|
||||
|
||||
Note that ``.send()`` does **not** throw an exception if the call stack is
|
||||
depleted but rather returns ``false`` in that case. The low-level functions
|
||||
|
Loading…
Reference in New Issue
Block a user