Skip to content

Commit 52061bf

Browse files
authored
Merge pull request #12 from stakewise/fix-vercel-build
Help for fix vervel
2 parents 09443d2 + 911285d commit 52061bf

File tree

37 files changed

+80
-230
lines changed

37 files changed

+80
-230
lines changed

blog/2019-05-28-first-blog-post.md

Lines changed: 0 additions & 12 deletions
This file was deleted.

blog/2019-05-29-long-blog-post.md

Lines changed: 0 additions & 44 deletions
This file was deleted.

blog/2021-08-01-mdx-blog-post.mdx

Lines changed: 0 additions & 24 deletions
This file was deleted.
-93.9 KB
Binary file not shown.

blog/2021-08-26-welcome/index.md

Lines changed: 0 additions & 29 deletions
This file was deleted.

blog/authors.yml

Lines changed: 0 additions & 23 deletions
This file was deleted.

blog/tags.yml

Lines changed: 0 additions & 19 deletions
This file was deleted.

docs/contracts/base/README.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
# Base
2+
3+
# Contents
4+
5+
- [multicall](multicall.md)
6+
- [ERC20 upgradable](erc20-upgradable.md)

docs/contracts/interfaces/IEthPoolEscrow.sol/interface.IEthPoolEscrow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ recipient. Can only be called by the current owner.
7171

7272
*WARNING: Forwarding all gas opens the door to reentrancy vulnerabilities.
7373
Make sure you trust the recipient, or are either following the
74-
checks-effects-interactions pattern or using {ReentrancyGuard}.*
74+
checks-effects-interactions pattern or using ReentrancyGuard.*
7575

7676

7777
```solidity

docs/contracts/interfaces/IGnoPoolEscrow.sol/interface.IGnoPoolEscrow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ function withdrawTokens(address token, address payee, uint256 amount) external;
7171
recipient. Can only be called by the current owner.
7272
WARNING: Forwarding all gas opens the door to reentrancy vulnerabilities.
7373
Make sure you trust the recipient, or are either following the
74-
checks-effects-interactions pattern or using {ReentrancyGuard}.*
74+
checks-effects-interactions pattern or using ReentrancyGuard.*
7575

7676

7777
```solidity

0 commit comments

Comments
 (0)