From 3eea88a3a84b278efc8d980f60c3b0d69dad0cbb Mon Sep 17 00:00:00 2001 From: Justin Starry Date: Tue, 2 Feb 2021 22:42:59 +0800 Subject: [PATCH] Update transactions.md --- docs/src/developing/programming-model/transactions.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/src/developing/programming-model/transactions.md b/docs/src/developing/programming-model/transactions.md index ce376ddaa5..6fe4093360 100644 --- a/docs/src/developing/programming-model/transactions.md +++ b/docs/src/developing/programming-model/transactions.md @@ -187,7 +187,7 @@ account's data. An example of where this could be a problem is if a token program, upon transferring the token out of an account, sets the account's lamports to zero, -assuming it will be deleted by the runtime. If the program does zero out the +assuming it will be deleted by the runtime. If the program does not zero out the account's data, a malicious user could trail this instruction with another that transfers the tokens a second time.