Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🖥️ Interpreters
bytecode, runtime, virtual machine, language implementation
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187461
posts in
13.0
ms
Ronald
Dehuysser
, founder of JobRunr, on their ambitious new
JavaClaw-like
agent runtime
⚡
JIT Exploitation
spring.io
·
1d
Your
profession
is
evolving
🔣
Type Systems
facebook.com
·
11h
30
ClawHub
Skills Are Quietly Recruiting Your AI Agent into a Crypto
Swarm
⚡
JIT Exploitation
manifold.security
·
1d
·
Hacker News
Qt
No
Contextless
Connect
🧮
Symbolic Execution
blog.broulik.de
·
6d
·
Lobsters
Christopher
Nolan
Addresses 'The Odyssey's
Shorter
Runtime & "Massive Amount Of Pressure" For New Movie
🔣
Type Systems
movieweb.com
·
8h
Safe
Bilevel
Delegation (
SBD
): A Formal Framework for Runtime Delegation Safety in Multi-Agent Systems
🌐
Protocol Fuzzing
arxiv.org
·
2h
RetroNAS
Brings Centralized File Storage to Retro PC
Setups
🖥️
Emulation
retrorgb.com
·
2d
Build
programmatic
agents with the Cursor
SDK
🧮
Symbolic Execution
cursor.com
·
3d
bpbonker/hexrun
: NPU-first local LLM runtime for Snapdragon X Elite (Windows on ARM)
🖥️
Emulation
github.com
·
16h
·
r/LLM
Android makes extensive use of neverallow rules to define and enforce the security goals for the SELinux. Since SELinux uses an
allowlist
approach,
neverallo
...
💀
Heap Exploitation
grapheneos.social
·
1d
Agent
Auth
: Why
OAuth
Wasn't Built for This
📋
Attestation
apideck.com
·
3d
·
Hacker News
,
r/mcp
Run custom MCP
proxies
serverless on Amazon Bedrock
AgentCore
Runtime
🐧
Kernel Exploitation
aws.amazon.com
·
1d
Dave
Meltzer
Gives Update On WWE
SmackDown
Runtime Changes
🎲
Fuzzing
wrestlinginc.com
·
13h
Bootstrapping
Sign Language
Annotations
with Sign Language Models
🧩
Intermediate Representation
machinelearning.apple.com
·
1d
Placing and routing quantum
LDPC
codes in
multilayer
superconducting hardware
🌐
Protocol Fuzzing
nature.com
·
6d
wl
_display_
connect
(3) Linux Manual Page
🐧
Kernel Exploitation
systutorials.com
·
6h
Silverfort
acquires
Fabrix
Security to bring AI decision-making to runtime access control
🔌
Hardware Security
siliconangle.com
·
2d
Zero-config Go
heap
profiling
💀
Heap Exploitation
coroot.com
·
4d
·
Hacker News
,
r/golang
This open-source
E-Ink
smartwatch
project trades features for extreme battery life
📟
Firmware Analysis
androidauthority.com
·
1d
The
Serial
Safety Net
🛡️
Memory Safety
dl.acm.org
·
6d
Sign up or log in to see more results
Sign Up
Login
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help