Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Language-based security
information-flow
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
24008
posts in
23.0
ms
SFD-Defense
: Engineering
Validation
of the Semantic Flow Dynamics Defense Framework
🌳
Archive Merkle Trees
zenodo.org
·
4d
·
Hacker News
·
…
Detecting speculative leaks with
compositional
semantics
🧠
Separation Logic
arxiv.org
·
1d
·
…
Insecure
Output
Handling
: Code Injection Through LLM Output (Part 3)
🛡️
CLI Security
infosecwriteups.com
·
15h
·
…
Lightweight
framework-agnostic
security framework
🛡️
WASM Sandboxing
shiro.apache.org
·
6h
·
Hacker News
·
…
Review:
SysMoBench
: Evaluating AI on
Formally
Modeling Complex Real-World Systems
⚙️
TLA+
emptysqua.re
·
1d
·
…
LangDrained
: Path traversal, SQL injection, and
Deserialization
of untrusted data in LangChain
🌳
Archive Merkle Trees
cyera.com
·
3d
·
Hacker News
,
r/netsec
·
…
RFC
Esolang
–
RFCs
as executable programs
📝
ABNF Parsing
esolangs.org
·
2d
·
Hacker News
·
…
Domain Separation
Belongs
in Your
IDL
✅
Format Verification
blog.foks.pub
·
2d
·
Hacker News
,
Hacker News
,
r/programming
·
…
A
Readable
Specification
of TLS 1.3
🌐
NetworkProtocols
davidwong.fr
·
3d
·
Hacker News
·
…
cisco-ai-defense/defenseclaw
: Security Governance for Agentic AI
⚡
Proof Automation
github.com
·
3d
·
Hacker News
·
…
Show HN:
Spectator
, a Programming Language for
Cybersecurity
🔐
CBOR
news.ycombinator.com
·
6d
·
Hacker News
·
…
Privacy Guard & Token
Parsimony
by Prompt and Context Handling and LLM
Routing
💻
Local LLMs
arxiv.org
·
1d
·
…
SNEAK
: Evaluating Strategic Communication and Information
Leakage
in Large Language Models
🧠
Intelligence Compression
arxiv.org
·
1d
·
…
A
Systematic
Taxonomy
of Security Vulnerabilities in the OpenClaw AI Agent Framework
🔒
WASM Capabilities
arxiv.org
·
2d
·
…
"Elementary, My Dear Watson." Detecting Malicious Skills via
Neuro-Symbolic
Reasoning across Heterogeneous
Artifacts
🎯
Threat Hunting
arxiv.org
·
2d
·
…
Beyond Content Safety: Real-Time
Monitoring
for Reasoning
Vulnerabilities
in Large Language Models
🧪
Binary Fuzzing
arxiv.org
·
6d
·
…
The System Prompt Is the Attack Surface: How LLM Agent Configuration
Shapes
Security and Creates
Exploitable
Vulnerabilities
🔒
WASM Capabilities
arxiv.org
·
6d
·
…
AI Security in the Foundation Model Era: A Comprehensive Survey from a
Unified
Perspective
🔍
Vector Forensics
arxiv.org
·
6d
·
…
Understanding AI Methods for
Intrusion
Detection and
Cryptographic
Leakage
🎯
Threat Hunting
arxiv.org
·
3d
·
…
Proofdoors
and Efficiency of
CDCL
Solvers
🎯
Interactive Provers
arxiv.org
·
3d
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help