Skip to content

Commit

Permalink
Update cover image, fix avatar background and add ` to file names
Browse files Browse the repository at this point in the history
  • Loading branch information
coppolaemilio committed Nov 28, 2024
1 parent 2129b08 commit 98d43b3
Show file tree
Hide file tree
Showing 4 changed files with 4 additions and 2 deletions.
1 change: 1 addition & 0 deletions _layouts/article.html
Original file line number Diff line number Diff line change
Expand Up @@ -105,6 +105,7 @@
.article-author .avatar {
border-radius: 100%;
margin: 0;
background: transparent;
}

.article-author .by {
Expand Down
1 change: 1 addition & 0 deletions assets/css/main.scss
Original file line number Diff line number Diff line change
Expand Up @@ -1385,6 +1385,7 @@ article.article-card .info .avatar {
left: 0px;
width: 25px;
height: 25px;
background: transparent;
}
article.article-card .info span {
font-size: 14px;
Expand Down
4 changes: 2 additions & 2 deletions collections/_article/statement-on-godloader-malware-loader.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,9 +16,9 @@ We encourage people to only execute software from trusted sources -- whether it'

For some more technical details:

Godot does not register a file handler for ".pck" files. This means that a malicious actor always has to ship the Godot runtime (.exe file) together with a .pck file. The user will always have to unpack the runtime together with the .pck to the same location and then execute the runtime. There is no way for a malicious actor to create a "one click exploit", barring other OS-level vulnerabilities. If such an OS-level vulnerability were used then Godot would not be a particularly attractive option due to the size of the runtime.
Godot does not register a file handler for ".pck" files. This means that a malicious actor always has to ship the Godot runtime (`.exe` file) together with a `.pck` file. The user will always have to unpack the runtime together with the `.pck` to the same location and then execute the runtime. There is no way for a malicious actor to create a "one click exploit", barring other OS-level vulnerabilities. If such an OS-level vulnerability were used then Godot would not be a particularly attractive option due to the size of the runtime.

This is similar to writing malicious software in Python or Ruby, the malicious actor will have to ship a python.exe or ruby.exe together with their malicious program.
This is similar to writing malicious software in Python or Ruby, the malicious actor will have to ship a `python.exe` or `ruby.exe` together with their malicious program.

## Good security practices

Expand Down
Binary file modified storage/blog/covers/statement-on-godloader-malware-loader.webp
Binary file not shown.

0 comments on commit 98d43b3

Please sign in to comment.