diff --git a/_layouts/article.html b/_layouts/article.html
index 72d43142e1..b7de7dc9f5 100644
--- a/_layouts/article.html
+++ b/_layouts/article.html
@@ -105,6 +105,7 @@
.article-author .avatar {
border-radius: 100%;
margin: 0;
+ background: transparent;
}
.article-author .by {
diff --git a/assets/css/main.scss b/assets/css/main.scss
index 5dafaf1d8d..7e6df7d85e 100644
--- a/assets/css/main.scss
+++ b/assets/css/main.scss
@@ -1385,6 +1385,7 @@ article.article-card .info .avatar {
left: 0px;
width: 25px;
height: 25px;
+ background: transparent;
}
article.article-card .info span {
font-size: 14px;
diff --git a/collections/_article/statement-on-godloader-malware-loader.md b/collections/_article/statement-on-godloader-malware-loader.md
index d8534c0816..f0a0cc0f99 100644
--- a/collections/_article/statement-on-godloader-malware-loader.md
+++ b/collections/_article/statement-on-godloader-malware-loader.md
@@ -16,9 +16,9 @@ We encourage people to only execute software from trusted sources -- whether it'
For some more technical details:
-Godot does not register a file handler for ".pck" files. This means that a malicious actor always has to ship the Godot runtime (.exe file) together with a .pck file. The user will always have to unpack the runtime together with the .pck to the same location and then execute the runtime. There is no way for a malicious actor to create a "one click exploit", barring other OS-level vulnerabilities. If such an OS-level vulnerability were used then Godot would not be a particularly attractive option due to the size of the runtime.
+Godot does not register a file handler for ".pck" files. This means that a malicious actor always has to ship the Godot runtime (`.exe` file) together with a `.pck` file. The user will always have to unpack the runtime together with the `.pck` to the same location and then execute the runtime. There is no way for a malicious actor to create a "one click exploit", barring other OS-level vulnerabilities. If such an OS-level vulnerability were used then Godot would not be a particularly attractive option due to the size of the runtime.
-This is similar to writing malicious software in Python or Ruby, the malicious actor will have to ship a python.exe or ruby.exe together with their malicious program.
+This is similar to writing malicious software in Python or Ruby, the malicious actor will have to ship a `python.exe` or `ruby.exe` together with their malicious program.
## Good security practices
diff --git a/storage/blog/covers/statement-on-godloader-malware-loader.webp b/storage/blog/covers/statement-on-godloader-malware-loader.webp
index 8a97c2b1e3..bbac236785 100644
Binary files a/storage/blog/covers/statement-on-godloader-malware-loader.webp and b/storage/blog/covers/statement-on-godloader-malware-loader.webp differ