Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ Memory Safety
memory safety, undefined behavior, sanitizers, Miri, safe systems
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
200219
posts in
44.6
ms
CHERIoT-Ibex
: Closing the door on memory safety vulnerabilities with
hardware-enforced
protection
🏷️
Memory Tagging
techcommunity.microsoft.com
·
5d
PoisonCap
: Efficient Hierarchical Temporal Safety for
CHERI
🛡️
Exploit Mitigations
arxiv.org
·
1d
Bun
is being
ported
from Zig to Rust
🧪
Binary Fuzzing
ziggit.dev
·
7h
RUSTSEC-2026-0143:
oneringbuf
: Double-free in `
vmem
` storage reachable from safe Rust
💣
Binary Exploitation
rustsec.org
·
16h
C++26:
Standard
library
hardening
💣
Binary Exploitation
sandordargo.com
·
2d
·
Lobsters
,
Hacker News
,
r/cpp
Fighting
Hyrum
's Law in
LLVM
💣
Binary Exploitation
maskray.me
·
4d
·
Lobsters
,
Hacker News
[oss-security] Linux kernel LPE ("
fragnesia
",
copyfail
3.0) [LWN.net]
🚧
Execution Guardrails
lwn.net
·
1d
·
Hacker News
Type-driven design in
automotive
C: how much of my code is manual type
checking
?
🛡️
Defensive Coding
lmilz.dev
·
1d
·
Hacker News
Ollama
Out-of-Bounds
Read Vulnerability Allows Remote Process Memory Leak
🛡️
Exploit Mitigations
thehackernews.com
·
4d
·
r/LLM
ASLR
& PIE Bypass:
Defeating
Randomized Memory in 2025 q
🛡️
Exploit Mitigations
medium.com
·
2d
CVE-2026-43500
🐛
Bug Bounty
security-tracker.debian.org
·
6d
Jam
Programming
Language
🧸
Toy Compilers
rapha.land
·
2d
Julia
Stability
vs. Rust for Scientific Computing
🎲
Test Generators
discourse.julialang.org
·
2d
·
Hacker News
Dirty
Frag
: Using the Page
Caches
as an Attack Surface
💣
Binary Exploitation
blog.qualys.com
·
5d
A
defer-safe
way to
allocate
nested arrays
🗑️
Garbage Collection
ziggit.dev
·
2d
Finding a
Crab
in the C:
Assured
Translation via Comparative Symbolic Execution
⚡
Interpreter Optimization
arxiv.org
·
1d
WATSON
: Leveraging Data
Watchpoints
for Shadow Stack Protection on Embedded Systems
🛡️
Exploit Mitigations
arxiv.org
·
3d
SafeManip
: A Property-Driven Benchmark for Temporal Safety Evaluation in
Robotic
Manipulation
✨
Effect Handlers
arxiv.org
·
2d
Janus: Compiler-Based Defense Against
Transient
Execution Attacks Using ARM Hardware
Primitives
💻
Microarchitectural Attacks
arxiv.org
·
3d
OverrideFuzz
: Semantic-Aware Grammar
Fuzzing
for Script-Runtime Vulnerabilities
🎲
Parser Fuzzing
arxiv.org
·
1d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help