Skip to content

Commit 331f2ab

Browse files
Michael Colburnbohendo
authored andcommitted
updated README to reference the local source code
1 parent 96df226 commit 331f2ab

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

bad_randomness/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ and take a fixed amount of sequential time to evaluate
3434

3535
## Examples
3636

37-
- The `random` function in [theRun](https://etherscan.io/address/0xcac337492149bdb66b088bf5914bedfbf78ccc18#code) was vulnerable to this attack. It used the blockhash, timestamp and block number to generate numbers in a range to determine winners of the lottery. To exploit this, an attacker could set up a smart contract that generates numbers in the same way and submits entries when it would win. As well, the miner of the block has some control over the blockhash and timestamp and would also be able to influence the lottery in their favor.
37+
- The `random` function in [theRun](theRun_source_code/theRun.sol) was vulnerable to this attack. It used the blockhash, timestamp and block number to generate numbers in a range to determine winners of the lottery. To exploit this, an attacker could set up a smart contract that generates numbers in the same way and submits entries when it would win. As well, the miner of the block has some control over the blockhash and timestamp and would also be able to influence the lottery in their favor.
3838

3939
## Sources
4040

0 commit comments

Comments
 (0)