Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
📝 Python Type Hints
Specific
Mypy, Type Checking, Static Analysis, Gradual Typing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
150783
posts in
13.9
ms
Typify
: A Lightweight Usage-driven Static
Analyzer
for Precise Python Type Inference
🔤
Type Systems
arxiv.org
·
2d
The 6 Big
Ideas
of
Typescript
🔤
Type Systems
sitr.us
·
21h
·
r/programming
Quiz
: Exploring
Protocols
in Python
✅
Pytest
realpython.com
·
4h
🐍 When
Static
Analysis Turns Dangerous: Command Injection in NASA’s
Cobra
Tool
⚙️
Systems Programming
medium.com
·
4d
HarshithReddy01/redos-analyzer
: Static analysis tool that detects and automatically fixes
ReDoS
vulnerabilities in Python using sre_parse AST analysis.
🐍
Python Tooling
github.com
·
2d
·
Hacker News
YASA
: Scalable Multi-Language
Taint
Analysis on the Unified AST at Ant Group
🔧
Software Engineering
lemmy.ml
·
6d
Beyond
Static
Analysis:
Proving
Automotive Cybersecurity and Functional Safety
⚙️
Systems Programming
embedded.com
·
2d
Meet
Vespasian
. It Sees What
Static
Analysis Can’t.
🔌
LSP Protocol
praetorian.com
·
6d
Some
sober
thinking about
Mythos
(full version with links at my newsletter):
🐧
Unix Philosophy
twitter.macworks.dev
·
1d
IDA
Plugin
Updates on 2026-04-06
🔍
Reverse Engineering
williballenthin.com
·
4d
Supply
Chain
Attacks Surge in March 2026
🔓
Binary Exploitation
malware.news
·
6d
An
Empirical
Analysis of Static Analysis Methods for Detection and Mitigation of Code Library
Hallucinations
🔓
Binary Exploitation
arxiv.org
·
12h
TheAuditorTool/sast-benchmark
: The first public OWASP-style SAST benchmark suite for Go, Rust, and Bash. Ground truth test cases with vulnerable/safe classifications for measuring detection accuracy (
Youden
's formula) of any static analysis tool.
🐍
Python Tooling
github.com
·
2d
·
Hacker News
A
Gradual
Probabilistic Lambda
Calculus
λ
Functional Programming
arxiv.org
·
2d
Guiding
Symbolic
Execution with Static Analysis and LLMs for Vulnerability Discovery
🔓
Binary Exploitation
arxiv.org
·
1d
Darksp33d/hyperhives-macos-infostealer-analysis
: Full static analysis of
HyperHives
macOS Rust infostealer — 571 decrypted config values, C2 infrastructure, DPRK/Contagious Interview attribution, YARA/Sigma rules, STIX 2.1 bundle, ATT&CK Navigator layer
🔓
Binary Exploitation
github.com
·
3d
·
Hacker News
A Multi-Agent Framework for Automated Exploit Generation with
Constraint-Guided
Comprehension
and Reflection
🔓
Binary Exploitation
arxiv.org
·
2d
TypePro
: Boosting LLM-Based Type Inference via Inter-Procedural
Slicing
🔤
Type Systems
arxiv.org
·
4d
Broken Quantum: A
Systematic
Formal
Verification Study of Security Vulnerabilities Across the Open-Source Quantum Computing Simulator Ecosystem
⚛️
Quantum Computing
arxiv.org
·
1d
Credential
Leakage
in LLM Agent Skills: A Large-Scale Empirical Study
💬
Prompt Engineering
arxiv.org
·
3d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help