Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔒 Language-based security
information-flow
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
24865
posts in
21.9
ms
Towards
Security-Auditable
LLM Agents: A Unified Graph
Representation
🌳
Archive Merkle Trees
arxiv.org
·
1d
DeepSeek-v4-Pro and
Hermes
: Unauthorized
Modification
of Security Controls
🌳
Archive Merkle Trees
eddieoz.com
·
5d
·
Hacker News
Agentic AI token
compression
using
Haskell
🔠
Type-Level Programming
blog.dan-gilmour.com
·
8h
·
Hacker News
Security-hardened
OpenCode
fork
🛡️
WASM Sandboxing
lockedcode.ai
·
1d
·
Hacker News
ARGUS
:
Defending
LLM Agents Against Context-Aware Prompt Injection
⚡
Proof Automation
arxiv.org
·
6d
When the
Ruler
is Broken: Parsing-Induced
Suppression
in LLM-Based Security Log Evaluation
🧪
Binary Fuzzing
arxiv.org
·
1d
An Automated Framework for Cybersecurity Policy
Compliance
Assessment Against Security Control
Standards
🛡
Cybersecurity
arxiv.org
·
1d
Exposing
LLM Safety Gaps Through Mathematical
Encoding
:New Attacks and Systematic Analysis
💻
Local LLMs
arxiv.org
·
6d
GLiGuard
:
Schema-Conditioned
Classification for LLM Safeguard
💻
Local LLMs
arxiv.org
·
1d
When Agents
Handle
Secrets: A Survey of
Confidential
Computing for Agentic AI
🌳
Archive Merkle Trees
arxiv.org
·
6d
Can I Check What I Designed? Mapping Security Design
DSLs
to Code
Analyzers
🔤
DSLs
arxiv.org
·
1d
Assessing, Exploiting, and
Mitigating
Syntactic
Robustness Failures in LLM-Based Code Generation
🦀
Rust Macros
arxiv.org
·
1d
AFL-ICP
: Enhancing Industrial Control Protocol Reliability via Specification-Guided Fuzzing
🧪
Binary Fuzzing
arxiv.org
·
5d
SkCC
: Portable and Secure Skill
Compilation
for Cross-Framework LLM Agents
🌐
Protocol Synthesis
arxiv.org
·
6d
Pen-Strategist
: A Reasoning Framework for
Penetration
Testing Strategy Formation and Analysis
🎯
Proof Tactics
arxiv.org
·
5d
Stable
Agentic Control:
Tool-Mediated
LLM Architecture for Autonomous Cyber Defense
🎯
Threat Hunting
arxiv.org
·
6d
Agentic
Vulnerability
Reasoning on Windows COM
Binaries
🧪
Binary Fuzzing
arxiv.org
·
5d
Dependency-Aware
Privacy for Multi-turn Agents
🔒
WASM Capabilities
arxiv.org
·
6d
Securing the Agent:
Vendor-Neutral
,
Multitenant
Enterprise Retrieval and Tool Use
🕵️
LDAP Enumeration
arxiv.org
·
4d
Towards an
Inferentialist
Account of Information Through
Proof-theoretic
Semantics
📏
Linear Logic
arxiv.org
·
4d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help