Rakesh
Rakesh
@ankitapuri can you close this?
@0xSandyy, could you please check issue #27? This issue was mentioned in that.
address sent via DM Thanks for the program 🙌🏻
> WDYM @rakesh0x7 @indeqs In this PR #66, @0xSandyy, @kadenzipfel, and I had a discussion related to linking` ./forcibly-sending-ether.md` in `dos-revert.md`. Please go through it once [here](https://github.com/kadenzipfel/smart-contract-vulnerabilities/pull/66#discussion_r1626364734). I thought that...
> For #54, a simple note should be enough. Eg: "Not exploitable in Solidity 0.8.24+" @mawutory Adding a simple note like "Not exploitable in Solidity 0.8.24+" is definitely helpful. However,...