Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Runtime Security
sandboxing, seccomp, runtime isolation, container security
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
7838
posts in
11.0
ms
rivet-dev/secure-exec
: Secure Node.js Execution Without a Sandbox A lightweight library for secure Node.js execution. No containers, no VMs — just npm-compatible
sandboxing
out of the box.
🛡️
Memory Safety
github.com
·
5d
·
…
Protecting Your Host from
Malicious
Dependencies
🔐
Hardware Security
grepular.com
·
9h
·
…
Detecting speculative leaks with
compositional
semantics
⚡
Side-Channel Attacks
arxiv.org
·
1d
·
…
Building a Secure
RAG
Pipeline on AWS: A Step-by-Step
Implementation
Guide
☁️
Cloud Security
hackernoon.com
·
22h
·
…
Go hard on agents, not on your
filesystem
🛡️
AI Security
news.ycombinator.com
·
1d
·
Hacker News
·
…
DEW
#150 - macOS Endpoint Security Firewall,
EDR
telemetry updates & Supply Chain Bonanza
🔐
InfoSec
detectionengineering.net
·
19h
·
…
IronFleet
:
proving
practical distributed systems correct
⚙️
Program Synthesis
youtube.com
·
4d
·
Lobsters
·
…
Domain Separation
Belongs
in Your
IDL
📡
Protocol Design
blog.foks.pub
·
1d
·
Hacker News
,
Hacker News
,
r/programming
·
…
Security updates for
Wednesday
[
LWN.net
]
🐧
Linux
lwn.net
·
17h
·
…
agentOS
- Everything Agents Need to Run and
Operate
🎯
AI Agents
rivet.dev
·
1d
·
Hacker News
,
Hacker News
·
…
Dynamic
SaaS
Security Platform
🏠
Self-Hosting
reco.ai
·
5d
·
…
Cybersecurity
, Infrastructure & Web Development
🔐
InfoSec
atomic.computer
·
23h
·
…
Open Source
Vulnerabilities
🛡️
Memory Safety
osv.dev
·
2d
·
…
EmDash
: A
spiritual
successor to WordPress and plugin security
🧩
Browser Extensions
blog.cloudflare.com
·
14h
·
Hacker News
·
…
Oblivious
SpaceSaving
: Heavy-Hitter Detection over Fully Homomorphic Encryption
🔢
Homomorphic Encryption
eprint.iacr.org
·
6d
·
…
instull
defender linux
pre-requisites
🔐
InfoSec
learn.microsoft.com
·
2d
·
…
A
Taxonomy
of
Cognitive
Security
🔬
Cognitive Science
schneier.com
·
20h
·
schneier.com
·
…
ChatGPT Data
Leakage
via a Hidden
Outbound
Channel in the Code Execution Runtime
⚡
Side-Channel Attacks
research.checkpoint.com
·
2d
·
…
Taming LLMs: Using
Executable
Oracles
to Prevent Bad Code
⚙️
Program Synthesis
john.regehr.org
·
6d
·
Hacker News
·
…
The Claude Code Source Leak: fake tools, frustration
regexes
,
undercover
mode, and more
🔧
Reverse Engineering
alex000kim.com
·
2d
·
Hacker News
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help