Jul 27, 2017 · 1 min read
If you do that you leave the contract open to abuse by malicious receivers.
In general you need to consider the case that any individual participant could be malicious as well as (and this is the nasty one) the case where all participants are malicious and conspiring jointly against the contract. The contract should be safe from all of these attack vectors to be truly secure.
