@@ -442,7 +442,7 @@ contract ReferenceModularAccount is
442442 }
443443 }
444444
445- // Run the pre hooks and copy their return data to the post hooks array, if an associated post- exec hook
445+ // Run the pre hooks and copy their return data to the post hooks array, if an associated post exec hook
446446 // exists.
447447 for (uint256 i = 0 ; i < hooksLength; ++ i) {
448448 HookConfig hookConfig = toHookConfig (executionHooks.at (i));
@@ -452,7 +452,7 @@ contract ReferenceModularAccount is
452452
453453 preExecHookReturnData = _runPreExecHook (hookConfig.moduleEntity (), data);
454454
455- // If there is an associated post- exec hook, save the return data.
455+ // If there is an associated post exec hook, save the return data.
456456 if (hookConfig.hasPostHook ()) {
457457 postHooksToRun[i].preExecHookReturnData = preExecHookReturnData;
458458 }
@@ -523,15 +523,15 @@ contract ReferenceModularAccount is
523523 /**
524524 * Order of operations:
525525 * 1. Check if the sender is the entry point, the account itself, or the selector called is public.
526- * - Yes: Return an empty array, there are no post- permissionHooks.
526+ * - Yes: Return an empty array, there are no post permissionHooks.
527527 * - No: Continue
528528 * 2. Check if the called selector (msg.sig) is included in the set of selectors the msg.sender can
529529 * directly call.
530530 * - Yes: Continue
531531 * - No: Revert, the caller is not allowed to call this selector
532532 * 3. If there are runtime validation hooks associated with this caller-sig combination, run them.
533- * 4. Run the pre- permissionHooks associated with this caller-sig combination, and return the
534- * post- permissionHooks to run later.
533+ * 4. Run the pre permissionHooks associated with this caller-sig combination, and return the
534+ * post permissionHooks to run later.
535535 */
536536 function _checkPermittedCallerAndAssociatedHooks ()
537537 internal
0 commit comments