Skip to content

Commit 40cd993

Browse files
fix(docs): clarify what kind of views we mean here
1 parent fc83a7d commit 40cd993

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

gitlab-pages/docs/advanced/security.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -458,7 +458,8 @@ Because the request comes directly from an authorised entity, contracts can be m
458458
This approach is a good default choice if both conditions hold true:
459459

460460
1. The sender contract is well secured against emitting arbitrary operations.
461-
For instance, it must not contain ["view" entrypoints](https://gitlab.com/tzip/tzip/-/blob/master/proposals/tzip-4/tzip-4.md#view-entrypoints) as defined in [TZIP-4](https://gitlab.com/tzip/tzip/-/blob/master/proposals/tzip-4/tzip-4.md).
461+
For instance, it must not contain a certain kind of ["view" entrypoints](https://gitlab.com/tezos/tzip/-/blob/master/proposals/tzip-4/tzip-4.md#view-entrypoints#view-entrypoints) as defined in [TZIP-4](https://gitlab.com/tzip/tzip/-/blob/master/proposals/tzip-4/tzip-4.md).
462+
Ordinary views with the `@view` attribute/decorator do not have this vulnerability because they cannot create operations.
462463

463464
2. You only need to authorise an immediate caller and not the contracts somewhere up in the call chain.
464465

0 commit comments

Comments
 (0)