Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🕳 LLM Vulnerabilities
Hacking LLMs, Prompt Injection
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
27199
posts in
355.4
ms
Introducing
envVarMappings
for Provider
Credentials
pulumi.com
·
4h
📡
ESPHome
The February 2026 Security Update Review
thezdi.com
·
1d
🔓
Hacking
Links 11/02/2026:
Fentanylware
(
CheeTok
) for ICE, Jimmy Lai Shows Journalism Became 'Crime' in Hong Kong
techrights.org
·
10h
📰
RSS Reading Practices
Coding agents as the new
compilers
anildash.com
·
4h
🪄
Prompt Engineering
remote
locks
and
distributed
locks
tautik.me
·
13h
🔓
Lock-Free Structures
Thread by @
HackingButLegal
on Thread
Reader
App
threadreaderapp.com
·
6h
💧
Litestream
Mastering
Authentication
in MCP: An AI Engineer’s Comprehensive Guide
pub.towardsai.net
·
2d
💉
Prompt Injection
Information Flow Verification Framework
Integrating
Static and
Formal
Verification Methods At The Pre-Silicon Stage (U. of Florida)
semiengineering.com
·
1d
📐
TLA+
CyberExplorer
: Benchmarking LLM Offensive Security Capabilities in a Real-World
Attacking
Simulation Environment
arxiv.org
·
1d
🏆
LLM Benchmarking
Show HN: Protect Against Prompt
Injection
in
OpenClaw
npmjs.com
·
11h
·
Discuss:
Hacker News
💉
Prompt Injection
Caption
Files and
Attribution
Reversal in LLMs
mikecaulfield.substack.com
·
10h
·
Discuss:
Substack
🪄
Prompt Engineering
Time Is a
Parasite
; So Is My
Bookmarklet
. Would you like to use it too?
angrybunnyman.com
·
2h
💡
Readwise
Hackable
Software
blog.abdellatif.io
·
1d
·
Discuss:
Hacker News
🔓
Hacking
Securing
GenAI
: Vol 5 — Model deployment and change management
pub.towardsai.net
·
2d
🛡️
AI Security
neo4j-labs/llm-graph-builder
:
Neo4j
graph construction from
unstructured
data using LLMs
github.com
·
12h
🦙
Ollama
Claude
Opus
4.6
Escalates
Things Quickly
lesswrong.com
·
7h
🔍
Quickwit
Identifying
Adversary
Tactics and Techniques in Malware
Binaries
with an LLM Agent
arxiv.org
·
2d
💉
Prompt Injection
Patterns
of Application Development Using… [
PDF/iPad/Kindle
]
leanpub.com
·
4h
🪄
Prompt Engineering
European
Commission
breached
computing.co.uk
·
11h
·
Discuss:
Hacker News
🔓
Hacking
Stress-Testing Alignment
Audits
With Prompt-Level Strategic
Deception
lesswrong.com
·
1d
🛡️
AI Security
Loading...
Loading more...
« Page 2
•
Page 4 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help