You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/selector-access-control.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,9 +87,9 @@ If you prefer to deploy the components individually:
87
87
88
88
This contract is a specialized risk management contract that combines `SelectorAccessControl` with controlled parameter adjustment capabilities for EVK vaults. It is compatible with the `GovernorAccessControl` and `GovernorAccessControlEmergency` contracts and enables authorized users to modify vault parameters (caps and interest rate models) while enforcing safety limits.
89
89
90
-
`CapRiskSteward` allows autorized users to increase/decrease supply and borrow caps by up to 50% over 3 days. The maximum readjustment factor recharges over time.
90
+
`CapRiskSteward` allows authorized users to increase/decrease supply and borrow caps by up to 50% over 3 days. The maximum readjustment factor recharges over time.
91
91
92
-
`CapRiskSteward` allows autorized users to substitute the interest rate model for an interest model deployed by the recognized factory.
92
+
`CapRiskSteward` allows authorized users to substitute the interest rate model for an interest model deployed by the recognized factory.
93
93
94
94
### Usage
95
95
@@ -108,4 +108,4 @@ This contract can be associated with one or more vaults deployed by the specifie
108
108
1. Deploy an instance of `HookTargetAccessControl`, specifying the EVC address, default admin, and associated EVault factory address
109
109
2. Grant roles to addresses for specific function selectors or the `WILD_CARD`
110
110
3. Install the `HookTargetAccessControl` instance as a hook target for the desired vault(s) and configure hooked operations
111
-
4. The vault will now enforce access control checks for hooked operations
111
+
4. The vault will now enforce access control checks for hooked operations
Copy file name to clipboardExpand all lines: docs/swaps.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
The `Swapper` and `SwapVerifier` contracts are helpers for executing swaps and swaps-to-repay operations on EVK vaults, using EVC batches.
4
4
5
-
## Security and trust boundries
5
+
## Security and trust boundaries
6
6
7
7
The `Swapper` contract is not trusted. From the protocol's perspective, it is a black box. Provided with a token to sell, it is supposed to execute the swap and return the bought token either as a balance available for deposit or as repaid debt. No assumptions are made about how the swap is performed or about the security of the `Swapper` code. In fact, the `Swapper` has no access control and allows anyone to remove any token balance it holds at any time. The provided implementation is just a reference; users are generally free to use any swapper they choose.
8
8
@@ -34,7 +34,7 @@ The general steps to use the `Swapper` contract are following:
34
34
35
35
The `Swapper` contract should implement the `ISwapper` interface. This ensures, that users could potentially provide their own implementations of the swapper contract in the UI, without needing to modify the FE code.
36
36
37
-
The main function is `swap()`, which takes a swap definition in a `SwapParams` struct. The params define a handler to use, swapping mode, bought and sold tokens, the amounts etc. See [ISwapper natspec](../src/Swaps/ISwapper.sol) for details. Note, that some parameters might be ignored in certain modes or by certain handlers, while others (`amountOut`) might have differrent semantics in certain modes.
37
+
The main function is `swap()`, which takes a swap definition in a `SwapParams` struct. The params define a handler to use, swapping mode, bought and sold tokens, the amounts etc. See [ISwapper natspec](../src/Swaps/ISwapper.sol) for details. Note, that some parameters might be ignored in certain modes or by certain handlers, while others (`amountOut`) might have different semantics in certain modes.
38
38
39
39
The interface also defines helper functions like `sweep`, `deposit`, `repay` and `repayAndDeposit` which allow consuming the contract's balance.
40
40
@@ -111,7 +111,7 @@ F2. Swap deposits from one EVault (A) to exact amount of another (B)
111
111
-`A.withdraw` to the swapper contract. The amount must cover all of the estimated swap costs with some extra, to account for slippage
112
112
-`swapper.multicall` with the following items:
113
113
-`Swapper.swap` - `exact input` on the generic handler with the off-chain payload
114
-
-`Swapper.swap` - `exact output` on one of the supportin handlers (Uni V2/V3) with the user specified `amountOut`. The receiver can be either the swapper contract or B vault.
114
+
-`Swapper.swap` - `exact output` on one of the supporting handlers (Uni V2/V3) with the user specified `amountOut`. The receiver can be either the swapper contract or B vault.
115
115
-`Swapper.sweep` the output token, into the B vault
116
116
-`SwapVerifier.verifyAmountMinAndSkim` check a minimum required amount was bought and claim the funds for the user. Because exact output swaps are not guaranteed to be exact always, a small slippage could be allowed.
0 commit comments