Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
⚡ Dependent Rust
Verification, Type-level Programming, Safety Proofs, Linear Types
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
16780
posts in
545.2
ms
On the
Reachability
Problem for One-Dimensional Thin
Grammar
Vector Addition Systems
arxiv.org
·
4d
🌳
Context free grammars
Identifying
Adversary
Tactics and Techniques in Malware
Binaries
with an LLM Agent
arxiv.org
·
1d
🦠
Malware Analysis
nouveau: a
tale
of two
bugs
airlied.blogspot.com
·
5d
·
Discuss:
airlied.blogspot.com
🎯
Emulator Accuracy
Sampling the
Oxford
CS
Library
blog.computationalcomplexity.org
·
6d
·
Discuss:
blog.computationalcomplexity.org
⛏️
Proof Mining
Full Disclosure: SEC
Consult
SA-20260202-0 :: Multiple vulnerabilities in Native
Instruments
Native Access (MacOS)
seclists.org
·
5d
🛡️
CLI Security
I Built a
RAG
Application from
Scratch
- Here's the Real Cost and Performance Data
dev.to
·
3d
·
Discuss:
DEV
🌀
Brotli Internals
Beyond Vulnerability Scanning, How
SBOM
Diff
Exposes Shadow Dependencies in Your Supply Chain
dev.to
·
5d
·
Discuss:
DEV
📦
Package Managers
mstrYoda/goraphdb
: A graph database implemented in Golang
github.com
·
3d
·
Discuss:
r/programming
🕸️
Neo4j
Webhook
Dispatcher
: a Rust library for reliable webhooks (retries,
DLQ
, signatures, durability)
github.com
·
4d
·
Discuss:
DEV
,
Hacker News
,
r/rust
🌐
WASI
Rust Project
Goals
2026
rust-lang.github.io
·
6d
·
Discuss:
Hacker News
🦀
Rust Borrowing
From Automation to Infection (Part II): Reverse Shells, Semantic
Worms
, and Cognitive
Rootkits
in OpenClaw Skills
blog.virustotal.com
·
5d
·
Discuss:
blog.virustotal.com
🔓
Hacking
Forcing
Rust: How Big Tech
Lobbied
the Government into a Language Mandate
medium.com
·
6d
·
Discuss:
Hacker News
🦀
Embedded Rust
Redis/Valkey
Replication
Internals
: The Architecture Behind Zero-Copy Command Propagation
frostzt.com
·
5d
·
Discuss:
Hacker News
,
r/programming
⚡
Redis Internals
Algebraic
Effects
for the Rest of Us
overreacted.io
·
6d
✨
Algebraic Effects
MLflow
's Missing
Validators
: An Authorization Bypass Across API Surfaces
tachyon.so
·
5d
·
Discuss:
Hacker News
🛡️
WASM Sandboxing
The
Null
Pointer
Crisis: Running God-Mode Software on Legacy Hardware
news.ycombinator.com
·
5d
·
Discuss:
Hacker News
🧪
Hardware Fuzzing
How we found
exploitable
security flaws in
OpenClaw
that manual review missed
cubic.dev
·
4d
·
Discuss:
Hacker News
🔓
Hacking
Unearthing Subtle
Misconfigurations
in Cloud-Native
Kubernet
forms.gle
·
6d
·
Discuss:
DEV
📦
Container Security
How not to program in
Dyalog
APL
toolofthought.com
·
6d
·
Discuss:
Lobsters
,
Hacker News
✅
Format Verification
The Wrong Work,
Done
Beautifully
domenic.me
·
5d
·
Discuss:
Hacker News
🎯
Gradual Typing
Loading...
Loading more...
« Page 13
•
Page 15 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help