diff --git a/src/oracles/providers/CurveV2CryptoEthOracle.sol b/src/oracles/providers/CurveV2CryptoEthOracle.sol index ed58d484..add670b7 100644 --- a/src/oracles/providers/CurveV2CryptoEthOracle.sol +++ b/src/oracles/providers/CurveV2CryptoEthOracle.sol @@ -102,7 +102,7 @@ contract CurveV2CryptoEthOracle is SystemComponent, SecurityBase, ISpotPriceOrac * @notice Allows owner of system to register a pool. * @dev While the reentrancy check implemented in this contact can technically be used with any token, * it does not make sense to check for reentrancy unless the pool contains ETH, WETH, ERC-677, ERC-777 tokens, - * as the known Curve reentrancy vulnerability only works when the caller recieves these tokens. + * as the known Curve reentrancy vulnerability only works when the caller receives these tokens. * Therefore, reentrancy checks should only be set to `1` when these tokens are present. Otherwise we * waste gas claiming admin fees for Curve. * @dev Converts any pool tokens that are the Eth pointer address to weth. Even if pools actually hold Eth, diff --git a/test/unit/stats/bridged/BridgedLSTCalculator.t.sol b/test/unit/stats/bridged/BridgedLSTCalculator.t.sol index 7c678074..b6ca46f8 100644 --- a/test/unit/stats/bridged/BridgedLSTCalculator.t.sol +++ b/test/unit/stats/bridged/BridgedLSTCalculator.t.sol @@ -456,7 +456,7 @@ contract BridgedLSTCalculatorTests is Test { testCalculator.onMessageReceive(keccak256("LST_SNAPSHOT"), 1, message); stats = testCalculator.current(); - assertEq(stats.discountHistory[0], 5e5); // the discount when the contract was initalized() was 5% + assertEq(stats.discountHistory[0], 5e5); // the discount when the contract was initialized() was 5% verifyDiscountTimestampByPercent(timestamps[0], stats.discountTimestampByPercent); }