Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
✅ Formal Verification
theorem proving, Coq, Lean, model checking, proof assistant
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187403
posts in
21.9
ms
Wasm
is not
quite
a stack machine
⚡
JIT Exploitation
purplesyringa.moe
·
4d
·
Lobsters
,
Hacker News
,
Hacker News
,
r/programming
Behavioral
security for AI agents, OS-level
interception
🐧
Kernel Exploitation
quintai.dev
·
1d
·
Hacker News
Minimizing
expected losses in multi-component missions with task reduction and
abort
options
🛡️
Exploit Mitigations
sciencedirect.com
·
1d
Runtime
Verification: Monitoring, Knowledge, and Uncertainty (
Lecture
Notes)
🌊
Dataflow Analysis
arxiv.org
·
23h
Show HN: Distributed-correctness tests using
Jepsen
tooling pass on
ArcadeDB
🛡️
Exploit Mitigations
arcadedb.com
·
3d
·
Hacker News
Rethinking
SQL
ETL
for modern data platforms
🌊
Dataflow Analysis
databricks.com
·
1d
GoogleCloudPlatform/activation-model-scanner
:
Verify
language model safety before deployment by analyzing activation patterns
🛡️
Exploit Mitigations
github.com
·
23h
·
Hacker News
Delegated Execution Sharding (DES): A
hyper-parallelized
zkEVM
for theoretically optimal execution-layer scalability
🌊
Dataflow Analysis
ethresear.ch
·
6d
Designing a
Governed
RTO
Compliance Agent Using Copilot Studio and Databricks Genie
🖥️
Interpreters
techcommunity.microsoft.com
·
2d
Mistral AI launches Workflows, a Temporal-powered
orchestration
engine already running millions of daily
executions
🖥️
Interpreters
venturebeat.com
·
2d
Sum-Check
as an
Algebraic
Tensor Reduction: Part 1
🧩
Intermediate Representation
blog.zksecurity.xyz
·
3d
·
Hacker News
Specification-Driven
Development framework for
agent-native
development
🔄
Reverse Engineering
specdd.ai
·
1d
·
Hacker News
The fall of the
theorem
economy (David
Bessis
)
🔣
Type Systems
lesswrong.com
·
1d
Mosaic
: Practical Malicious Security for
Garbled
Circuits on Bitcoin
🔌
Hardware Security
eprint.iacr.org
·
6d
Beyond Code Reasoning: A
Specification-Anchored
Audit Framework for Expert-Augmented Security Verification
⚡
JIT Exploitation
arxiv.org
·
23h
Matrix-analytic reliability modeling of k-out-of-n: G
repairable
systems with K-mixed redundancy and
repairman
’s multiple vacations
🔣
Type Systems
sciencedirect.com
·
2d
We
scanned
54 MCP servers and found 20
bugs
. Here's what breaks.
⚡
JIT Exploitation
blackwell-systems.github.io
·
3d
·
r/mcp
AWS
Interconnect
Reaches General Availability with Managed
Multicloud
and Last-Mile Connectivity
📟
Firmware Analysis
infoq.com
·
1d
jessealama/thales
: TypeScript compiler and JavaScript engine in Lean
🔣
Type Systems
github.com
·
15h
·
Hacker News
I built a 21-agent
manuscript
pipeline, hit a wall I couldn't engineer past, and want to give the
spec
away.
⚡
JIT Exploitation
kaizenrw.com
·
2d
·
r/PromptEngineering
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help