Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
Skippy's Feed
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
83188
posts in
836.6
ms
Loading...
Subscribe
Selfhosted
Bitwarden
and "The client is a backup"
bitwarden.com
·
5d
·
Discuss:
r/selfhosted
🖥
Selfhosting
otoro.net
otoro.net
·
2d
🖥
Selfhosting
Generate MCP servers from any API
spec
,
docs
, or English
mcpforge-chi.vercel.app
·
2d
·
Discuss:
Hacker News
🖥
Selfhosting
LiteRT
for Web with
LiteRT.js
| Google AI Edge | Google AI for Developers
ai.google.dev
·
2d
👨
Programming
Bitcoin
PIPEs
v2
eprint.iacr.org
·
2d
🔒
Cybersecurity
【Early Access】
GLM
5即将发布
|
GLM
5 is about to be released
linux.do
·
2d
👨
Programming
Restricting external
egress
to a single API (ChatGPT) in
Istio
Ambient Mesh?
reddit.com
·
2d
·
Discuss:
r/kubernetes
🖥
Selfhosting
Beyond
Roleplay
:
Jailbreaking
Gemini with drugs and ritual
tidepool.leaflet.pub
·
2d
·
Discuss:
Hacker News
👨
Programming
280+
Leaky
Skills: How OpenClaw &
ClawHub
Are Exposing API Keys and PII
dev.to
·
1d
·
Discuss:
DEV
🔒
Cybersecurity
10 AI
Automation
Workflows
That Save 10+ Hours/Week
dev.to
·
23h
·
Discuss:
DEV
👨
Programming
**Abstract:** The
proliferation
of digital
avatars
within metaverse environments introduces complex challenges surrounding intellectual property rights, part...
freederia.com
·
2d
🔒
Cybersecurity
Show HN: Build a coding agent in 500 lines (Pure Python, No
Vector
DBs
)
news.ycombinator.com
·
4d
·
Discuss:
Hacker News
👨
Programming
Sign up or login to customize your feed and get personalized topic recommendations
Sign Up
Login
To
Defend
Against Cyber Attacks, We Must
Teach
AI Agents to Hack
arxiv.org
·
3d
🔒
Cybersecurity
Reading Between the Code
Lines
: On the Use of
Self-Admitted
Technical Debt for Security Analysis
arxiv.org
·
3d
🔒
Cybersecurity
How Tools Turn into Agents: What Actually
Happens
at
Runtime
pub.towardsai.net
·
2d
👨
Programming
Detecting
backdoored
language models at scale
microsoft.com
·
3d
·
Discuss:
Hacker News
🔒
Cybersecurity
Risky Bulletin:
Plone
CMS
stops supply-chain attack
news.risky.biz
·
3d
🔒
Cybersecurity
Pol-Jak-295/PolLand
: My personal hyprland rice (
janky
, but hey. It's mine).
github.com
·
1d
·
Discuss:
r/archlinux
🖥
Selfhosting
gauteh/lieer
: Fast email-fetching, sending, and two-way tag synchronization between notmuch and GMail
github.com
·
2d
👨
Programming
More than 40,000 WordPress sites
affected
by new malware
flaw
- find out if you're
affected
techradar.com
·
3d
🔒
Cybersecurity
Loading...
Loading more...
« Page 35
•
Page 37 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help