๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“œ Smart Contracts

Solidity, Auditing, Formal Verification, DeFi Protocols

Smart contract vulnerabilities
adguard.comยท1d
๐Ÿ”—Crypto
# How I Built a Fully Decentralized On-Chain Game with 0 Lines of Code, Thanks to Gemini
dev.toยท16hยท
Discuss: DEV
๐Ÿ”—Crypto
Smart Caching Strategies for High-Performance Enterprise Applications
synthesized.ioยท1dยท
Discuss: DEV
โœ…Formal Verification
No More โ€˜Ship and Prayโ€™: Testing SaaS Billing Systems with Playwright & Stripe Test Clocks
hackernoon.comยท1d
๐Ÿ”—Crypto
Improve Data Integrity and Security with Accelerated Hash Functions and Merkle Trees in cuPQC 0.4
developer.nvidia.comยท15h
๐ŸงฎHomomorphic Encryption
SPL Lightweight Multisource Mixed Computation Practices
github.comยท1dยท
Discuss: Hacker News, r/programming
๐Ÿ”งMLIR
Blockchain Wants to Be the Dealer in Your Next Game of Poker
hackernoon.comยท8h
๐Ÿ”—Crypto
What is Model Context Protocol and why does it matter to software engineers?
techradar.comยท1d
๐ŸŒDecentralized AI
Umair Shahid: PostgreSQL Database SLAs: Why Hidden Issues Often Break Customer Commitments
postgr.esยท1d
โœ…Formal Verification
๐Ÿšฆ Fail-Safe Messaging in Embedded Systems
linkedin.comยท10hยท
Discuss: r/embedded
โœ…Formal Verification
Software Contracts: Fundamentals of Software Management
dev.toยท1dยท
Discuss: DEV
โœ…Formal Verification
What it took to make a multi-agent trading simulation durable and observable
union.aiยท4hยท
Discuss: Hacker News
๐Ÿค–AI
The Supply Chain Paradox: When โ€œHardenedโ€ Images Become a Vendor Lock-in Trap
docker.comยท1d
๐Ÿ”’Hardware Security
Comprehensive MCP Security Checklist: Protecting Your AI-Powered Infrastructure
lab.wallarm.comยท4h
๐Ÿ”’Hardware Security
ProMed: Shapley Information Gain Guided Reinforcement Learning for Proactive Medical LLMs
arxiv.orgยท1d
๐Ÿ›ก๏ธAI Safety
Droit Achieves ISO/IEC 27018:2019 Certification for Personal Data Protection in Public Clouds
prnewswire.comยท1d
๐ŸงฎHomomorphic Encryption
Saleae Analyzer for the BDM protocol
zetier.comยท16h
๐Ÿ”’Hardware Security
Building Hyperforce Service Mesh: Blast Radius Reduction, Scale Optimization, and Open Source Innovation
engineering.salesforce.comยท1h
๐Ÿ”„Protocol Design
Android App End-to-End Testing with FusionAuth
fusionauth.ioยท13hยท
Discuss: Hacker News
โœ…Formal Verification
A Comprehensive Guide to ZK Rollup Development for DeFi Projects
dev.toยท1dยท
Discuss: DEV
๐Ÿ”’Hardware Security
Loading...Loading more...
AboutBlogChangelogRoadmap