Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Python Tooling
Ruff, Black, pytest, Development Tools
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
571
posts in
7.4
ms
A
gray
day
Β
ποΈ
Outdoor Recreation
grahamsisland.com
Β·
4d
Metaβs new model is
Muse
Spark, and meta.ai chat has some
interesting
tools
Β
π¬
Prompt Engineering
simonwillison.net
Β·
1d
Β·
Hacker News
,
Hacker News
Part III β When the security scanner became the weapon:
Trivy
β
LiteLLM
β Axios
Β
π
Binary Exploitation
securesql.info
Β·
21h
A 15-Min
Tofu
Stir-fry
So Good You'll Forget It's Actually Vegan!
Β
π½οΈ
Food Pairing
thewoksoflife.com
Β·
6d
Security through
chaos
Β
π
Binary Exploitation
phpunit.expert
Β·
2d
Spark creator
bags
computing
gong
for making big data a little bit smaller
Β
βοΈ
Systems Programming
theregister.com
Β·
21h
Fedora
44: Best New Features
Β
π»
Terminal Emulators
debugpoint.com
Β·
1d
Open
Thread
428.5 +
Zagreb
Update
Β
π
Code Review
astralcodexten.com
Β·
1d
Exposing
an Agentic
Pipeline
as an MCP Server
Β
π
LSP Protocol
walsenburgtech.com
Β·
3d
Shipyard
is a cross-platform CI orchestration layer that coordinates validation for AI agents working across parallel
worktrees
Β
βοΈ
Systems Programming
danielraffel.me
Β·
1d
Speeding Up
IAMTrail
: One Boto3 Process Instead of 1,500 CLI
Invocations
Β
π¦
UV Package Manager
zoph.me
Β·
6d
PKLITE
supplement 6: Min/max
alloc
., part 1
Β
π
Binary Exploitation
entropymine.wordpress.com
Β·
4d
Tool: GitHub
Repo
Size
Β
π³
Git Internals
simonwillison.net
Β·
16h
Part II β Third-party
libraries
: the vulnerability layer nobody
counted
Β
π
Binary Exploitation
securesql.info
Β·
23h
The AI-Ready Software Developer #24 β
Specification
Is A
Conversation
Β
π¬
Prompt Engineering
codemanship.wordpress.com
Β·
6d
Micro
Β
π§
Microcontrollers
graemefawcett.ca
Β·
6d
The iPhone
Exploit
Kit Is on GitHub Now. We Warned You About AI
Tooling
. The Weapons Are Following.
Β
π
Binary Exploitation
dugganusa.com
Β·
3d
Components
of A Coding Agent
Β
π€
AI Code Generation
magazine.sebastianraschka.com
Β·
6d
Β·
Lobsters
,
Hacker News
Burrows
Wheeler
Transform for Compression
Β
π
Reverse Engineering
denvaar.dev
Β·
6d
Container smoke testing with
Goss
: stop guessing if your
.env
works
Β
β
Pytest
blog.zolty.systems
Β·
4d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help