Skip to content

Commit

Permalink
Fix typo in eip-3607.md (ethereum#7270)
Browse files Browse the repository at this point in the history
"self desctruct" -> "self destruct"
  • Loading branch information
flanagansteve authored and RaphaelHardFork committed Jan 30, 2024
1 parent e038634 commit 1c8d624
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion EIPS/eip-3607.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ We note that it was always the expected that a contract account's behaviour is c
This does not exclude all possible attack vectors, only the most serious one. Further possible attack vectors via address collisions between contracts and EOAs are:
1. An attacker can convince a user to send funds to an account before it is deployed. Some applications require this behaviour (e.g. state channels).
2. A chain reorg can happen after a contract is deployed. If the reorg removes the contract deployment transaction the funds can still be accessed using the private key.
3. A contract can self desctruct, with the stated intention that ERC20s (or other tokens) in the contract would be burned. However, they can now be accessed by a key for that address.
3. A contract can self destruct, with the stated intention that ERC20s (or other tokens) in the contract would be burned. However, they can now be accessed by a key for that address.

All these scenarios are much harder to exploit for an attacker, and likely have much lower yield making the attacks unlikely to be economically viable.

Expand Down

0 comments on commit 1c8d624

Please sign in to comment.