Evaluating LLM-Generated Detection Rules in Cybersecurity
sublime.security·22h·
Discuss: Hacker News
🎯Threat Hunting
A Prompt to Create a Starter Common Lisp Project
funcall.blogspot.com·1h·
🧠Lisp Dialects
A tutorial for the Mercury programming language
sebastian.graphics·5h·
Discuss: Hacker News
🔗Concatenative Programming
my work colleagues use generics everywhere for everything
reddit.com·1h·
Discuss: r/golang
💧Liquid Types
An Approach to Checking Correctness for Agentic Systems
arxiv.org·15h
Temporal Logic
Three ways I learn with AI
interjectedfuture.com·1d
📐Proof Assistants
Why and When to Use Sentence Embeddings Over Word Embeddings
machinelearningmastery.com·7h
📝Text Embeddings
Tree proof (semantic tableau) generator
umsu.de·1h·
Discuss: Hacker News
📐Proof Assistants
Building An Offensive Security AI Agent - Part 2
infosecwriteups.com·1d
🧪CBOR Fuzzing
How to Use RAG with Amazon Bedrock + Nova for Building Chatbots
dev.to·1d·
Discuss: DEV
📝Concrete Syntax
Packing Multiple Services into One Rust Binary
carlriis.com·8h·
Discuss: Hacker News
🔒Linear Types
GPT-5-Codex Prompting Guide
cookbook.openai.com·1d
🛡️CLI Security
Proof Rules for MetaSMT
philipzucker.com·4d
🧮Z3 Solver
Learning by Doing: An Introduction to Static Program Analysis
medium.com·23h·
Discuss: Hacker News
📊Static Analysis
How to Detect Forbidden Words in Text (Without Slowing Down) – Part II
blog.codeminer42.com·6h
🌳Trie Structures
Keystone Titles: Organize 100–500 Variants and Prevent LLM Looping
lightcapai.medium.com·2d·
Discuss: Hacker News
🎯Proof Tactics
Issue 491
haskellweekly.news·1d
🧬Functional Programming
Code Mode: the better way to use MCP
blog.cloudflare.com·6h·
Discuss: Hacker News
λLambda Formalization
Yet Another Random Story: VBScript's Randomize Internals
blog.doyensec.com·1d
🧪Binary Fuzzing
The Trust Paradox: When Your AI Gets Catfished
docker.com·6h
🔓Hacking