From c3eecaed8735f14418848670489d175f1521f77a Mon Sep 17 00:00:00 2001 From: bt3gl <1130416+bt3gl@users.noreply.github.com> Date: Wed, 21 Sep 2022 18:33:15 -0700 Subject: [PATCH] =?UTF-8?q?=F0=9F=8D=A4=20minor=20grammar?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- Top-Immunefi-Vulnerabilities/redacted-cartel.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/Top-Immunefi-Vulnerabilities/redacted-cartel.md b/Top-Immunefi-Vulnerabilities/redacted-cartel.md index d452ad8..8732903 100644 --- a/Top-Immunefi-Vulnerabilities/redacted-cartel.md +++ b/Top-Immunefi-Vulnerabilities/redacted-cartel.md @@ -8,9 +8,9 @@ * The vulnerability was rated as critical because it would have allowed a malicious attacker to assign a user’s allowance to themselves, enabling the attacker to steal that user’s funds. -* The purpose of ERC-20’s `approve(spender, amount)` function is to allow any address to spend the tokens on behalf of the tokens’ owner. +* The purpose of ERC20’s `approve(spender, amount)` function is to allow any address to spend the tokens on behalf of the tokens’ owner. -* The vulnerability here consisted of a faulty implementation of standard ERC-20 functions in REDACTED’s wxBTRFLY token, which is a wrapped version of the xBTRFLY. +* The vulnerability here consisted of a faulty implementation of standard ERC20 functions in REDACTED’s wxBTRFLY token, which is a wrapped version of the xBTRFLY. ### Vulnerability @@ -42,7 +42,7 @@ where `allowance(sender, recipient)` should be `allowance(sender, msg.sender)`.
-[Here](https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/contracts/token/ERC20/ERC20.sol) is how OpenZeppelin implements this function for `ERC-20`: +[Here](https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/contracts/token/ERC20/ERC20.sol) is how OpenZeppelin implements this function for `ERC20`: ``` function transferFrom(