Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Language-based security
information-flow
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
28873
posts in
20.5
ms
Static
taint
analysis for LLM agents
deepclause.substack.com
·
1d
·
Discuss:
Substack
🐛
Fuzzing
Guidelines for Writing
Cryptography
Specifications
cfrg.github.io
·
4h
·
Discuss:
Hacker News
📋
Format Specification
Learning to
Generate
Secure Code via Token-Level
Rewards
arxiv.org
·
23h
🔱
Galois Cryptography
freest-lang/freest
: A programming language for safe
concurrency
powered by context-free session types.
github.com
·
1d
🔗
Functional Compilers
InfoSec News Nuggets 03/02/2026 -
AboutDFIR
- The Definitive
Compendium
Project
aboutdfir.com
·
7h
🛡
Cybersecurity
A Secure Architecture for AI-Powered Natural Language
Analytics
Over Enterprise Data
Warehouses
hackernoon.com
·
7h
🌀
Brotli Internals
Refining
Almost-Safe Value Functions on the
Fly
arxiv.org
·
23h
🔒
Type Safety
Visually secure
steganography
scheme for color images based on Trans-CS network, Cantor and
4D-TSCNN
sciencedirect.com
·
1d
🕵️
Steganographic Compression
Risky
Bulletin
: LLMs can
deanonymize
internet users based on their past comments
news.risky.biz
·
1d
🕵️
Vector Smuggling
Understanding
SMF
properties
davepacheco.net
·
6h
💧
Liquid Types
Understanding the
A2A
Protocol
for Agentic AI in Network Operations
networkphil.com
·
11h
🌐
NetworkProtocols
Show HN: An
Auditable
Decision Engine for AI Systems
maelstrom.ghostlogic.tech
·
2h
·
Discuss:
Hacker News
✓
Automated Theorem Proving
The truly
programmable
SASE
platform
blog.cloudflare.com
·
22h
🖥️
Self-hosted Infrastructure
How ‘silent
probing
’ can make your security playbook a
liability
cyberscoop.com
·
17h
🎯
Threat Hunting
Parse
, Don't
Guess
architecture-weekly.com
·
11h
✅
Format Verification
blog
dds
: 2026-03-02 — Vibe coding toward the incident
horizon
spinellis.gr
·
11h
·
Discuss:
Hacker News
🧪
Binary Fuzzing
MCP Security in 2026: Lessons From Real
Exploits
and Early
Breaches
hackernoon.com
·
8h
🔓
Hacking
Why Service
Providers
Must Become Secure AI
Factories
paloaltonetworks.com
·
23h
🖥️
Self-hosted Infrastructure
CyberStrikeAI
tool
adopted
by hackers for AI-powered attacks
bleepingcomputer.com
·
4h
⚡
Proof Automation
An AI Odyssey, Part 1:
Correctness
Conundrum
johndcook.com
·
1h
🔧
Hardware Verification
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help