From eacf9209f778dc0d7844f1e726be47a23651b4f0 Mon Sep 17 00:00:00 2001 From: Jack May Date: Wed, 3 Feb 2021 09:03:02 -0800 Subject: [PATCH] update transaction.md --- docs/src/developing/programming-model/transactions.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/src/developing/programming-model/transactions.md b/docs/src/developing/programming-model/transactions.md index ce376ddaa5..6fe4093360 100644 --- a/docs/src/developing/programming-model/transactions.md +++ b/docs/src/developing/programming-model/transactions.md @@ -187,7 +187,7 @@ account's data. An example of where this could be a problem is if a token program, upon transferring the token out of an account, sets the account's lamports to zero, -assuming it will be deleted by the runtime. If the program does zero out the +assuming it will be deleted by the runtime. If the program does not zero out the account's data, a malicious user could trail this instruction with another that transfers the tokens a second time.