Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔒 Language-based security
information-flow
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
18443
posts in
375.6
ms
Zero-Trust Runtime Verification for Agentic Payment Protocols: Mitigating Replay and
Context-Binding
Failures in
AP2
arxiv.org
·
15h
🌳
Archive Merkle Trees
Persistent
Human Feedback, LLMs, and Static
Analyzers
for Secure Code Generation and Vulnerability Detection
arxiv.org
·
3d
🐛
Fuzzing
Beyond the Hype: 9 Cybersecurity Realities
CIOs
Must Face at
RSAC
2026
avoa.com
·
2d
🎯
Threat Hunting
The anti-Bayesian is standing at the back window with a shotgun, scanning for priors coming over the hill, while a million assumptions just walk right into his house through the front door. (also, an interesting point by
Yann
LeCun
about human language)
statmodeling.stat.columbia.edu
·
3d
🔲
Cellular Automata
The
Human-Centric
Stack: Why Logs Are the Great
Equalizer
in the Age of AI
loggly.com
·
4d
📝
Log Parsing
A
hack-proof
internet? Quantum
encryption
could be the key
science.org
·
4d
🔐
Quantum Security
How I Built My Project in
Haskell
dev.to
·
1d
·
Discuss:
DEV
🔗
Functional Compilers
13,981 Downloads. A
Hardcoded
ByteDance Token. Zero
Vetting
.
dev.to
·
1d
·
Discuss:
DEV
🚀
Indie Hacking
Beyond
agentic
coding
haskellforall.com
·
2d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
,
r/programming
⚡
Effectful Programming
Rethinking Time in
Computation
– From Wall
Clocks
to State Transitions
d1gesto.blogspot.com
·
3d
·
Discuss:
Hacker News
⏰
Time Crystals
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
3d
·
Discuss:
Hacker News
📦
Container Security
Operant
AI targets ‘
shadow
’ AI agents with real-time security platform
thenewstack.io
·
3d
·
Discuss:
Hacker News
🎯
Threat Hunting
Building a battle tested C
compiler
in a new language using
Codex
moonbitlang.com
·
3d
·
Discuss:
Hacker News
🏗️
Compiler Archaeology
The Engagement Trap: 45
Adversarial
Patterns in Modern AI
Assistants
pastebin.com
·
3d
·
Discuss:
Hacker News
🎯
Threat Hunting
Sammā
Suit – Open-source security armor for AI agents (all 8 layers
enforced
)
sammasuit.com
·
3d
·
Discuss:
Hacker News
🛡️
WASM Sandboxing
akshat666/ephemeral-first-security-framework
: Security through
transience
, not just encryption
github.com
·
6d
·
Discuss:
Hacker News
🌳
Archive Merkle Trees
Evaluating
and
mitigating
the growing risk of LLM-discovered 0-days
red.anthropic.com
·
4d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
🧪
Binary Fuzzing
Digging into
UUID
,
ULID
, and implementing my own
atlas9.dev
·
5d
·
Discuss:
Hacker News
🌳
Archive Merkle Trees
Boundary
Engineering
cabreza.substack.com
·
3d
·
Discuss:
Substack
🛡️
Error Boundaries
stdlib
v7.2
erlang.org
·
3d
·
Discuss:
Hacker News
🦀
Rusty Databases
Loading...
Loading more...
« Page 6
•
Page 8 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help