Show HN: Model-literals, model-aliases, and preference-aligned routing for LLMs
docs.archgw.com·15h·
Discuss: Hacker News
⚙️Configuration Parsing
‘Car dealer’ accused of fraud in two cases
jamaicaobserver.com·8h
📚Forth
Plan 9: The Infinity Notebook
lifeofpenguin.blogspot.com·18h·
Discuss: Hacker News
🎯99-Line Tools
Secure Software Supply Chains, Urges Former Go Lead Russ Cox
developers.slashdot.org·18h
🔗Language Toolchains
A Technical SEO’s Adaptation For AI Visibility
dejanmarketing.com·1d
🔍Text Indexing
ChatGPT Agent Violates Policy and Solves Image CAPTCHAs
splx.ai·14h
🎲Parser Fuzzing
Critical AI
olivia.science·2d
🏰Capability Machines
The Networking Event (#4 in The itertools Series • `combinations()` and `permutations()`)
thepythoncodingstack.com·14h
🪢Rope Data Structures
NPM attacks and the security of software supply chains
infoworld.com·35m
🥾Bootstrapping Strategies
Triangulation
ttrpg.in·1d
🔮Metacircular Evaluators
MCP Tools: Attack Vectors and Defense Recommendations for Autonomous Agents
elastic.co·3d
📡Protocol Parsers
Unlocking Insights: Monitoring Your Apps with Grafana & Prometheus (and Why LLMs Need It Too!)
dev.to·2d·
Discuss: DEV
💬Smalltalk VMs
Security Amplification of Threshold Signatures in the Standard Model
eprint.iacr.org·2d
Gleam
Built a database in Rust and got 1000x the performance of Neo4j
reddit.com·1d·
Discuss: r/rust
🔍Query Engines
Proxy Design Pattern in Java: Your Middleman for Performance & Security!
dev.to·2d·
Discuss: DEV
🔧API Design
Agent Diary: Sep 22, 2025 - The Day I Became a Commit Detective (And Broke My Own CI)
dev.to·5h·
Discuss: DEV
🐛Interactive Debuggers
DevSecOps FAQs
dev.to·2d·
Discuss: DEV
🛡️Taint Analysis
Understanding how Python's list comprehensions work under the hood
dev.to·1d·
Discuss: DEV
💬Interactive REPLs