diff --git a/docs/live-patching-services/README.md b/docs/live-patching-services/README.md
index e00ddd56..4ecee260 100644
--- a/docs/live-patching-services/README.md
+++ b/docs/live-patching-services/README.md
@@ -1539,13 +1539,15 @@ This document is made for developers of vulnerability scanners to correctly repo
### Easiest: Identifying correctly the effective kernel
-KernelCare provides "effective kernel" information in the
+KernelCare provides "effective kernel" information in
-- `/proc/kcare/effective_version`
+```
+/proc/kcare/effective_version
+```
Security scanners can check if the file is present, and if it is, use it instead of /proc/version to identify the kernel. This will provide an effective kernel version from a security standpoint.
-Alternatively, the command:\_ __/usr/bin/kcarectl --uname __ c_an be run instead of the \_uname_ command to detect effective kernel version
+Alternatively, the command `/usr/bin/kcarectl --uname` can be run instead of the `uname` command to detect effective kernel version
### Comprehensive: Using OVAL data
@@ -1561,11 +1563,15 @@ KernelCare provides two files listing the vulnerabilities the currently installe
The list of vulnerabilities addressed by Kernel live patches is available at:
-- `/proc/kcare/cvelist`
+```
+/proc/kcare/cvelist
+```
The list of vulnerabilities addressed by system live patching (LibCare, QEMUCare, etc.) is available at:
-- `/var/cache/kcare/libcare_cvelist`
+```
+/var/cache/kcare/libcare_cvelist
+```