diff --git a/_layouts/article.html b/_layouts/article.html index 72d43142e1..b7de7dc9f5 100644 --- a/_layouts/article.html +++ b/_layouts/article.html @@ -105,6 +105,7 @@ .article-author .avatar { border-radius: 100%; margin: 0; + background: transparent; } .article-author .by { diff --git a/assets/css/main.scss b/assets/css/main.scss index 5dafaf1d8d..7e6df7d85e 100644 --- a/assets/css/main.scss +++ b/assets/css/main.scss @@ -1385,6 +1385,7 @@ article.article-card .info .avatar { left: 0px; width: 25px; height: 25px; + background: transparent; } article.article-card .info span { font-size: 14px; diff --git a/collections/_article/statement-on-godloader-malware-loader.md b/collections/_article/statement-on-godloader-malware-loader.md index d8534c0816..f0a0cc0f99 100644 --- a/collections/_article/statement-on-godloader-malware-loader.md +++ b/collections/_article/statement-on-godloader-malware-loader.md @@ -16,9 +16,9 @@ We encourage people to only execute software from trusted sources -- whether it' For some more technical details: -Godot does not register a file handler for ".pck" files. This means that a malicious actor always has to ship the Godot runtime (.exe file) together with a .pck file. The user will always have to unpack the runtime together with the .pck to the same location and then execute the runtime. There is no way for a malicious actor to create a "one click exploit", barring other OS-level vulnerabilities. If such an OS-level vulnerability were used then Godot would not be a particularly attractive option due to the size of the runtime. +Godot does not register a file handler for ".pck" files. This means that a malicious actor always has to ship the Godot runtime (`.exe` file) together with a `.pck` file. The user will always have to unpack the runtime together with the `.pck` to the same location and then execute the runtime. There is no way for a malicious actor to create a "one click exploit", barring other OS-level vulnerabilities. If such an OS-level vulnerability were used then Godot would not be a particularly attractive option due to the size of the runtime. -This is similar to writing malicious software in Python or Ruby, the malicious actor will have to ship a python.exe or ruby.exe together with their malicious program. +This is similar to writing malicious software in Python or Ruby, the malicious actor will have to ship a `python.exe` or `ruby.exe` together with their malicious program. ## Good security practices diff --git a/storage/blog/covers/statement-on-godloader-malware-loader.webp b/storage/blog/covers/statement-on-godloader-malware-loader.webp index 8a97c2b1e3..bbac236785 100644 Binary files a/storage/blog/covers/statement-on-godloader-malware-loader.webp and b/storage/blog/covers/statement-on-godloader-malware-loader.webp differ