GSoC '25: Parallel Macro Expansion
lorrens.me·23h·
Discuss: r/rust
🦀Rust Macros
Flag this post
How to Use Zorn's Lemma
gowers.wordpress.com·14h·
Discuss: Hacker News
⚔️Lean Theorem
Flag this post
Trap Bots on Your Server
maurycyz.com·22h·
Discuss: Hacker News
🔄Burrows-Wheeler
Flag this post
Understanding AI Trustworthiness: A Scoping Review of AIES & FAccT Articles
arxiv.org·6h
🤖AI Curation
Flag this post
🚀 Why Your "Forgot Password" Flow Sucks (And How We're Fixing It With AI)
dev.to·1d·
Discuss: DEV
🔓Hacking
Flag this post
ReasoningBank Explained: How AI Agents Are Finally Learning to Remember
rewire.it·1d·
Discuss: Hacker News
💾Persistence Strategies
Flag this post
Ken Thompson's "Trusting Trust" compiler backdoor - Now with the actual source code (2023)
micahkepe.com·2d·
💻Programming languages
Flag this post
From “I want automation” to “It runs”: 15 decisions for lead enrichment that actually execute
dev.to·1h·
Discuss: DEV
🔄Reproducible Builds
Flag this post
The security paradox of local LLMs
quesma.com·4d·
🔓Hacking
Flag this post
Rationalizable Screening and Disclosure under Unawareness
arxiv.org·6h
🕳️Information Leakage
Flag this post
Automated Anomaly Detection & Root Cause Analysis in Optical Data Center Security Logs via Graph Neural Networks
dev.to·1d·
Discuss: DEV
🎯Threat Hunting
Flag this post
Coding by Vibe, by Tests, or by Spec Which Hat Are You Wearing?
dev.to·14h·
Discuss: DEV
📏Code Metrics
Flag this post
AI agents require to-do lists to stay on track
blog.justcopy.ai·1d·
Discuss: Hacker News
⚙️TLA+
Flag this post
MCP Guardrails: Mitigating Data Poisoning and Prompt Injection in AI Coding Assistants
dev.to·3d·
Discuss: DEV
🌐DNS Security
Flag this post
When the VIBEs Start to Fade
mindruptive.com·3d·
Discuss: Hacker News
🏗️Compiler Archaeology
Flag this post
Genie, Take the Wheel
kuril.in·18h·
Discuss: Hacker News
📏Code Metrics
Flag this post
How I Crushed Advent of Code And Solved Hard Problems Using Autogen Jupyter Executor and Qwen3
dev.to·9h·
Discuss: DEV
⚙️WASM Runtime
Flag this post
Meta-Learning for Cross-Task Generalization in Protein Mutation Property Prediction
arxiv.org·6h
🦀Rust Macros
Flag this post
Microsoft 365 Copilot – Arbitrary Data Exfiltration via Mermaid Diagrams
dev.to·8h·
Discuss: DEV
🔓Hacking
Flag this post