Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🛡️ Vulnerability Research
CVE, exploit research, security vulnerability, bug hunting
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
3171
posts in
14.6
ms
FixV2W
: Correcting Invalid
CVE-CWE
Mappings with Knowledge Graph Embeddings
📟
Firmware Analysis
arxiv.org
·
3d
Do Synthetic
Trajectories
Reflect
Real Reward Hacking? A Systematic Study on Monitoring In-the-Wild Hacking in Code Generation
🎯
Taint Analysis
arxiv.org
·
2d
GenDetect
: Generalizing Reactive Detection for Resilience Against
Imitative
DeFi Attack Cascade
🛡️
Exploit Mitigations
arxiv.org
·
19h
One Word at a Time:
Incremental
Completion
Decomposition
Breaks LLM Safety
🧩
Intermediate Representation
arxiv.org
·
19h
SeqShield
: A Behavioral Analysis Approach to Uncover
Rootkits
💾
Binary Analysis
arxiv.org
·
2d
CrossCommitVuln-Bench
: A Dataset of
Multi-Commit
Python Vulnerabilities Invisible to
Per-Commit
Static Analysis
⚡
JIT Exploitation
arxiv.org
·
6d
MesonGS
++: Post-training Compression of 3D Gaussian Splatting with
Hyperparameter
Searching
🧩
Intermediate Representation
arxiv.org
·
19h
When the Agent Is the
Adversary
: Architectural Requirements for Agentic AI
Containment
After the April 2026 Frontier Model Escape
🛡️
Exploit Mitigations
arxiv.org
·
2d
·
Hacker News
When Agents Shop for You: Role
Coherence
in
AI-Mediated
Markets
🔣
Type Systems
arxiv.org
·
19h
GoAT-X
: A Graph of
Auditing
Thoughts for Securing Token Transactions in Cross-Chain Contracts
⛓️
ROP Chains
arxiv.org
·
2d
Hidden Secrets in the arXiv: Discovering, Analyzing, and Preventing
Unintentional
Information Disclosure in Source Files of Scientific
Preprints
🎯
Taint Analysis
arxiv.org
·
6d
·
Hacker News
Cross-Domain
Transfer of
Hyperspectral
Foundation Models
🧩
Intermediate Representation
arxiv.org
·
19h
The Vehicle May Be Sick: Denial of
Diagnostic
Services by
Exploiting
the CAN Transport Protocol
🐧
Kernel Exploitation
arxiv.org
·
2d
Automation-Exploit: A Multi-Agent LLM Framework for Adaptive Offensive Security with Digital Twin-Based
Risk-Mitigated
Exploitation
🛡️
Exploit Mitigations
arxiv.org
·
3d
HOI-aware
Adaptive Network for
Weakly-supervised
Action Segmentation
🧩
Intermediate Representation
arxiv.org
·
19h
Incisor
: Ex Ante Cloud Instance Selection for
HPC
Jobs
🛡️
Exploit Mitigations
arxiv.org
·
2d
Mono2Sls
: Automated
Monolith-to-Serverless
Migration via Multi-Stage Pipeline with Static Analysis
🔣
Type Systems
arxiv.org
·
2d
Removing
Sandbagging
in LLMs by Training with Weak
Supervision
🎲
Fuzzing
arxiv.org
·
3d
Incompressible
Knowledge Probes: Estimating Black-Box LLM Parameter Counts via
Factual
Capacity
✅
Formal Verification
arxiv.org
·
1d
·
Hacker News
Branch Landing: Bloom Filter-Based Source
Authorization
for Forward-Edge
CFI
on RISC-V
🔒
CFI
arxiv.org
·
2d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help