Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔐 Capability Systems
Object Capabilities, Access Control, Security Models, seL4
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
181748
posts in
22.8
ms
dckc/awesome-ocap
: Awesome Object Capabilities and Capability Security
🔒
WASM Capabilities
github.com
·
2d
A
Quasi-Experimental
Developer Study of Security Training in
LLM-Assisted
Web Application Development
🔒
WASM Capabilities
arxiv.org
·
4d
OWASP
Artificial Intelligence Security Verification Standard
AISVS
Docs
🔒
WASM Capabilities
owasp.org
·
2d
·
Hacker News
Why Security is the Core of System Design
🏠
Homelab Security
learningmindquest.medium.com
·
6d
Building a
Company-Wide
AI Assistant: Architecture, Security, and
Self-Improvement
🏠
Homelab Automation
bitsafe.notion.site
·
2d
·
Hacker News
What is
Application
Security?
🔒
WASM Capabilities
orca.security
·
2d
Week 4 of
Defensive
Security
🎯
Threat Hunting
medium.com
·
6d
Beyond the
hype
: The critical role of security in
responsible
AI development
🛡️
CLI Security
techradar.com
·
5d
Security Without
Hierarchy
🔐
Capability Security
theanarchistlibrary.org
·
3d
·
Hacker News
ABAC
:
Attribute-Based
Access Control
🔐
Capability Security
medium.com
·
4d
Supercharged
Security: Security in the Time of
Mythos
🎯
Threat Hunting
fortinet.com
·
5d
Closing
the Security
Gap
in the Age of Agentic Coding
🔒
Language-based security
wiz.io
·
4d
Making
opportunistic
cyberattacks
harder by design
🌐
DNS Security
malware.news
·
5d
Preserving Decision Sovereignty in Military AI: A Trade-Secret-Safe
Architectural
Framework for Model
Replaceability
, Human Authority, and State Control
🔒
WASM Capabilities
arxiv.org
·
1d
Building agent-first
governance
and security
🔒
WASM Capabilities
technologyreview.com
·
4d
Microsoft 365 Copilot readiness and
resiliency
with SharePoint and
M365
Backup/Archive
💾
Persistence Strategies
techcommunity.microsoft.com
·
3d
AVISE
: Framework for
Evaluating
the Security of AI Systems
🎯
Threat Hunting
arxiv.org
·
2d
Symbolic
Guardrails
for Domain-Specific Agents: Stronger Safety and Security Guarantees Without
Sacrificing
Utility
🔒
Language-based security
arxiv.org
·
5d
An AI Agent Execution
Environment
to
Safeguard
User Data
🛡️
Preservation Proofs
arxiv.org
·
3d
Towards Optimal Agentic
Architectures
for
Offensive
Security Tasks
🎯
Threat Hunting
arxiv.org
·
3d
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help