๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“œ Smart Contracts

Solidity, Auditing, Formal Verification, DeFi Protocols

Smart contract vulnerabilities
adguard.comยท1d
๐Ÿ”—Crypto
# How I Built a Fully Decentralized On-Chain Game with 0 Lines of Code, Thanks to Gemini
dev.toยท13hยท
Discuss: DEV
๐Ÿ”—Crypto
Smart Caching Strategies for High-Performance Enterprise Applications
synthesized.ioยท1dยท
Discuss: DEV
โœ…Formal Verification
No More โ€˜Ship and Prayโ€™: Testing SaaS Billing Systems with Playwright & Stripe Test Clocks
hackernoon.comยท1d
๐Ÿ”—Crypto
SPL Lightweight Multisource Mixed Computation Practices
github.comยท1dยท
Discuss: Hacker News, r/programming
๐Ÿ”งMLIR
Blockchain Wants to Be the Dealer in Your Next Game of Poker
hackernoon.comยท6h
๐Ÿ”—Crypto
What is Model Context Protocol and why does it matter to software engineers?
techradar.comยท22h
๐ŸŒDecentralized AI
Umair Shahid: PostgreSQL Database SLAs: Why Hidden Issues Often Break Customer Commitments
postgr.esยท1d
โœ…Formal Verification
๐Ÿšฆ Fail-Safe Messaging in Embedded Systems
linkedin.comยท7hยท
Discuss: r/embedded
โœ…Formal Verification
Software Contracts: Fundamentals of Software Management
dev.toยท1dยท
Discuss: DEV
โœ…Formal Verification
What it took to make a multi-agent trading simulation durable and observable
union.aiยท1hยท
Discuss: Hacker News
๐Ÿค–AI
The Supply Chain Paradox: When โ€œHardenedโ€ Images Become a Vendor Lock-in Trap
docker.comยท23h
๐Ÿ”’Hardware Security
Comprehensive MCP Security Checklist: Protecting Your AI-Powered Infrastructure
lab.wallarm.comยท1h
๐Ÿ”’Hardware Security
ProMed: Shapley Information Gain Guided Reinforcement Learning for Proactive Medical LLMs
arxiv.orgยท1d
๐Ÿ›ก๏ธAI Safety
Droit Achieves ISO/IEC 27018:2019 Certification for Personal Data Protection in Public Clouds
prnewswire.comยท1d
๐ŸงฎHomomorphic Encryption
Android App End-to-End Testing with FusionAuth
fusionauth.ioยท10hยท
Discuss: Hacker News
โœ…Formal Verification
Saleae Analyzer for the BDM protocol
zetier.comยท14h
๐Ÿ”’Hardware Security
A Comprehensive Guide to ZK Rollup Development for DeFi Projects
dev.toยท1dยท
Discuss: DEV
๐Ÿ”’Hardware Security
Express middleware for JWT-based authentication against FusionAuth
github.comยท15hยท
Discuss: Hacker News
๐Ÿ”—Crypto
Why Shipping Vibe-Coded Prototypes to Production Breaks Products
arbisoft.comยท4hยท
Discuss: DEV
๐Ÿ”งMLIR
Loading...Loading more...
AboutBlogChangelogRoadmap