From a32eebe7ff40cd55a6c9da8594f5395a5e1b40e9 Mon Sep 17 00:00:00 2001 From: Franz-Stefan Preiss Date: Mon, 3 Feb 2025 17:22:10 +0100 Subject: [PATCH] Fix typo in security-best-practices (#4620) --- docs/developer-docs/security/security-best-practices/misc.mdx | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/developer-docs/security/security-best-practices/misc.mdx b/docs/developer-docs/security/security-best-practices/misc.mdx index 3741f3f8e2..68c4a738b8 100644 --- a/docs/developer-docs/security/security-best-practices/misc.mdx +++ b/docs/developer-docs/security/security-best-practices/misc.mdx @@ -82,9 +82,9 @@ actor Randomness { #### Caveats: - The method doesn't scale when large amount of random bytes is requested as `raw_rand` must be called for every 32 bytes. -### 2. Using `raw_rand` as seed for a psuedo random number generator (PRNG) +### 2. Using `raw_rand` as seed for a pseudo random number generator (PRNG) -In this Rust example, we seed the the output from `raw_rand` in a known PRNG like ChaCha20 in the `init` and `post_upgrade` hooks and generate randomness by calling the `random_bytes` method. +In this Rust example, we seed the output from `raw_rand` in a known PRNG like ChaCha20 in the `init` and `post_upgrade` hooks and generate randomness by calling the `random_bytes` method. ```rust use candid::{CandidType, Principal};