Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Parser Security
Input Validation, Zip Bombs, ReDoS, Attack Vectors
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
184372
posts in
35.5
ms
Reverse
CAPTCHA
: Evaluating LLM
Susceptibility
to Invisible Unicode Instruction Injection
arxiv.org
·
4h
🎲
Parser Fuzzing
Parse
, Don't
Guess
architecture-weekly.com
·
16h
📋
JSON Parsers
Hacking
DVWA
: A Deep Dive into
Reflected
and Stored XSS
medium.com
·
5h
🎲
Parser Fuzzing
BrowseSafe
: Understanding and
Preventing
Prompt Injection Within AI Browser Agents
research.perplexity.ai
·
12h
🎲
Parser Fuzzing
Securing
Shell Execution Agents: From Validation to Custom
DSLs
yortuc.com
·
1d
·
Discuss:
Hacker News
✅
Configuration Validation
Rare Not Random – Using
Token
Efficiency for Secrets
Scanning
lookingatcomputer.substack.com
·
2h
·
Discuss:
Substack
🔗
Hash Functions
Towards the
Systematic
Testing of Regular
Expression
Engines
arxiv.org
·
4h
🧪
Parser Testing
The
TokenBreak
Attack
hiddenlayer.com
·
1d
⚡
Tokenizer Benchmarks
Static
taint
analysis for LLM agents
deepclause.substack.com
·
1d
·
Discuss:
Substack
🎲
Parser Fuzzing
Be
Careful
of What You Embed:
Demystifying
OLE Vulnerabilities
papers.cool
·
1d
🛡️
Security Type Systems
Online Code
Editors
Expose Sensitive Data: Implementing End-to-End Encryption and User
Consent
as Solutions
dev.to
·
13h
·
Discuss:
DEV
🛡️
Security Type Systems
CySecurity
News - Latest Information Security and Hacking Incidents: New
Massiv
Malware Targets Android Banking Users Through Fake IPTV App
cysecurity.news
·
1h
·
Discuss:
Blogger
🏷️
Memory Tagging
Python
Injection
Attacks
medium.com
·
22h
🏃
Escape Analysis
Portswigger
Walkthrough Lab: Username enumeration via
subtly
different responses
infosecwriteups.com
·
3h
🌍
Minimal HTTP
Preventing
Prompt Injection and
Jailbreaking
hiddenlayer.com
·
1d
🏷️
Memory Tagging
NodeMedic-FINE
: Automatic Detection and
Exploit
Synthesis for Node.js Vulnerabilities
papers.cool
·
1d
✅
Configuration Validation
Show HN: Offline desktop tool that
extracts
media
endpoints
from raw HTML
z3r0dayzion-install.github.io
·
6h
·
Discuss:
Hacker News
✨
Gleam
Billion
laughs
attack
en.wikipedia.org
·
1d
📏
Linear Memory
How to
Hash
Passwords in Python and
Encrypt
Sensitive Data the Right Way
dev.to
·
1d
·
Discuss:
DEV
🔗
Hash Functions
Single
Direction
vs Low-Rank
Refusal
in Small LLMs
lesswrong.com
·
9h
⚡
Tokenizer Optimization
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help