Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Capability Systems
Object Capabilities, Access Control, Security Models, seL4
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
17050
posts in
902.9
ms
DCP-o-matic โข Re: CPL as
compositions
and multiple
CPLs
dcpomatic.com
ยท
9h
๐
Shell Combinators
Which cybersecurity
terms
your management might be
misinterpreting
kaspersky.com
ยท
15h
๐ก
Cybersecurity
Boost LLM Security: automated Red
Teaming
at Scale with
Promptfoo
blog.nviso.eu
ยท
4d
โก
Proof Automation
Fragments
: February 9
martinfowler.com
ยท
14h
๐ฃ๏ธ
Domain-Specific Languages
Will the Remote Access Security Act close the cloud
loophole
in the US Export Administration
Regulations
?
exportcompliancemanager.com
ยท
13h
ยท
Discuss:
Hacker News
๐
CBOR
Show HN:
SubAnalyzer
subdomain
discovery and external attack surface map tool
subanalyzer.com
ยท
1d
ยท
Discuss:
Hacker News
๐ต๏ธ
Domain Enumeration
Rethinking
the Linux Desktop: Base OS and
AppImages
world.hey.com
ยท
19h
ยท
Discuss:
Hacker News
๐
Operating system internals
Structure Beats
Prose
:
Specs
for Coding Agents That Actually Work
medium.com
ยท
2h
ยท
Discuss:
Hacker News
โก
Proof Automation
OpenClaw
: I gave an AI my credit card and let it
loose
on Amazon
codedojo.com
ยท
18h
ยท
Discuss:
Hacker News
๐
Hacking
Opus
4.5 really
changed
things
kylerush.org
ยท
1d
ยท
Discuss:
Hacker News
๐
MARC Evolution
Why
securing
AI model
weights
isnโt enough
the-substrate.net
ยท
12h
ยท
Discuss:
Hacker News
๐ต๏ธ
Vector Smuggling
Graph
algebra
en.wikipedia.org
ยท
6h
๐
Graph Rewriting
The Future of Systems
novlabs.ai
ยท
2d
ยท
Discuss:
Hacker News
โ๏ธ
TLA+
A
practical
guide to information
architecture
(2nd edition)
maadmob.com.au
ยท
1d
๐๏ธ
Information Architecture
Deobfuscation
and Analysis of
Ring-1.io
back.engineering
ยท
1d
ยท
Discuss:
Hacker News
๐
Secure Boot
Company as Code
blog.42futures.com
ยท
4d
ยท
Discuss:
Hacker News
๐
WASM Capabilities
Database
Schema
as Code Intelligence
dev.to
ยท
1d
ยท
Discuss:
DEV
๐๏ธ
Database Internals
My
Workflow
for
Agentic
Coding
szymonkrajewski.pl
ยท
1d
โ๏ธ
Lean Tactics
A
one-prompt
attack that breaks LLM safety
alignment
microsoft.com
ยท
16h
ยท
Discuss:
Hacker News
๐
DNS Security
Software Engineering
Transformation
2026
mfranc.com
ยท
2d
ยท
Discuss:
Hacker News
๐
Language Evolution
Loading...
Loading more...
« Page 3
โข
Page 5 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help