Pleasant Imperative Program Proofs with GallinaC
arxiv.org·5h
⚔️Lean Tactics
System Instruction Fixed Point
funcall.blogspot.com·14h·
Proof Automation
Brzozowski Derivatives: An Exercise in Combinatory Style
blog.zdsmith.com·1d·
🔗Concatenative Programming
What is Algebraic about Algebraic Effects?
interjectedfuture.com·1d
Algebraic Effects
Charles Sanders Peirce, George Spencer Brown, and Me • 20
inquiryintoinquiry.com·16h
🔀Category Theory
Clean Code Tips I Learned from Senior Engineers
blog.algomaster.io·5h
📏Code Metrics
HTB Planning Machine Walkthrough | Easy HackTheBox Guide for Beginners
infosecwriteups.com·23h
🛡️CLI Security
What Makes System Calls Expensive: A Linux Internals Deep Dive
blog.codingconfessions.com·15h·
Discuss: Hacker News
🔩Systems Programming
Topological Sort: Managing Mutable Structures in Haskell
mmhaskell.com·2d
🔗Topological Sorting
Discord as a C2 and the cached evidence left behind
pentestpartners.com·1d
📟Terminal Forensics
Punch-Cards to Prompts: Rebooting Reality
medium.com·21h·
Discuss: Hacker News
⚙️Proof Engineering
Balance between refactoring and inheritance in your code
github.com·1d·
Discuss: Hacker News
Format Verification
Automated Conformance Testing Through Hybrid Symbolic Execution & Reinforcement Learning
dev.to·7h·
Discuss: DEV
🔍Concolic Testing
Claude Can (Sometimes) Prove It
galois.com·9h·
⚔️Lean Tactics
PHP: A fractal of bad design (2012)
eev.ee·19h·
Discuss: Hacker News
📝Concrete Syntax
Greyscale-box test-driven development
blog.ploeh.dk·1d
🧪Property-Based Testing
The peril of unquoted Python strings, and how they caused CVE-2024-9287
pythonkoans.substack.com·1d·
Discuss: Substack
Shell Verification
Obelisk 0.24.1
obeli.sk·38m·
Discuss: Hacker News
🧩WASM Components
Developing trustworthy AI: 9 key threat categories
reversinglabs.com·18h
🎯Threat Hunting
Compiling with Continuations
swatson555.github.io·5h·
Discuss: Hacker News
💻Programming languages