Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🎯 Taint Analysis
Specific
taint tracking, data flow, information flow, dynamic taint
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187459
posts in
17.6
ms
Ghost
in the Agent:
Redefining
Information Flow Tracking for LLM Agents
🛡️
Exploit Mitigations
arxiv.org
·
2d
How web intelligence is
powering
the next
wave
of AI Infrastructure
🖥️
Interpreters
thenextweb.com
·
5d
The (In)security
Landscape
of AI-Powered GitHub
Actions
(Part 2/2)
⚡
JIT Exploitation
wiz.io
·
13h
I've just released version 1.1.1 of the
Checkstyle
Extension for
bld
💾
Binary Analysis
github.com
·
4h
Article:
CodeGuardian
: A Model Context Protocol Server for AI-Assisted Code Quality Analysis and Security
Scanning
🛡️
Exploit Mitigations
infoq.com
·
2d
The real war is
misinformation
– and it’s
blocking
climate action
🛡️
Exploit Mitigations
johnmenadue.com
·
13h
Teardown of
AlphaFold
codebase
with a AST-free LLM-free static analysis engine
📜
Decompilation
squid-protocol.github.io
·
3d
·
Hacker News
Static Analysis Results
Interchange
Format (
SARIF
)
💾
Binary Analysis
sarif.info
·
2d
A security bug in
AEAD
sockets
🛡️
Exploit Mitigations
lwn.net
·
1d
Microsoft Turns to Anthropic’s
Mythos
to
Improve
Cyber Defense
🦠
Malware Analysis
devops.com
·
6d
Programming Isn’t About
Syntax
: It’s About Understanding the
Basics
🔍
Program Analysis
medium.com
·
2d
·
DEV
,
r/programming
More
ancient
Linux device support faces the
chop
🔌
Hardware Security
theregister.com
·
6d
·
Hacker News
Justin
's
Linklog
🎲
Fuzzing
jmason.ie
·
2d
VulStyle
: A Multi-Modal Pre-Training for Code
Stylometry-Augmented
Vulnerability Detection
💾
Binary Analysis
arxiv.org
·
23h
Javierlozo/llm-audit
: Static analysis for TypeScript / JavaScript LLM-application code. OWASP LLM Top 10 at commit time. A complement to
Semgrep
's p/ai-best-practices for the TS/JS ecosystem.
⚡
JIT Exploitation
github.com
·
1d
·
Hacker News
Process-Mining of
Hypertraces
: Enabling Scalable Formal Security Verification of (Automotive) Network
Architectures
✅
Formal Verification
arxiv.org
·
6d
How we use Django and
MongoDB
in Energy AI - a unified Python web app for adaptive
conversational
AI
⛓️
ROP Chains
github.com
·
4d
·
DEV
SeqShield
: A Behavioral Analysis Approach to Uncover
Rootkits
💾
Binary Analysis
arxiv.org
·
2d
MAS-SZZ
: Multi-Agentic
SZZ
Algorithm for
Vulnerability-Inducing
Commit Identification
🛡️
Exploit Mitigations
arxiv.org
·
2d
How We Built
CropGuard
AI — Plant Disease Detection with Django,
MongoDB
Atlas and Deep Learning
⛓️
ROP Chains
github.com
·
4d
·
DEV
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help