🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
✅ Shell Verification

Bash Safety, Script Correctness, Command Validation, Terminal Security

Cutting clips from videos with Emacs
mbork.pl·1d
🎬ffmpeg
How To: Proxmox Backup Server 4 (VM) Installation
derekseaman.com·2d
💾Proxmox Storage
Is Gleam production ready?
lindbakk.com·3d·
Discuss: Lobsters
🌀Brotli Internals
Duct UI now comes with an MCP server
duct-ui.org·2h·
Discuss: Hacker News
🧩WASM Components
Qwen-Image-Edit
huggingface.co·1d·
Discuss: Hacker News, r/LocalLLaMA
📸PNG Optimization
Alexander Korotkov: Ordered Insertion Optimization in OrioleDB
orioledb.com·1d·
Discuss: Hacker News, Hacker News
🔄Sync Engine
Keeping an Eye on MFA-Bombing Attacks, (Mon, Aug 18th)
isc.sans.edu·1d
🎯NTLM Attacks
How to model the world? Introduction to Laplace Neuron
abibulic.github.io·15h·
Discuss: Hacker News
🔲Cellular Automata
Blink Twice: Measuring Strategic Deception Amongst LLMs
coup.khoj.dev·15h·
Discuss: Hacker News
🎯Proof Tactics
Building a self-hosted, fast AI research agent using OpenAI and SerpApi
serpapi.com·19h·
Discuss: Hacker News
⚡Proof Automation
You can just build things
maxrozen.com·2d·
Discuss: Hacker News, r/programming
⚙️Build Archaeology
The ‘Obfuscated C Code Contest’ Confronts the Age of AI
thenewstack.io·2d·
Discuss: r/C_Programming
🧪Binary Fuzzing
A Constant-Time Hardware Architecture for the CSIDH Key-Exchange Protocol
arxiv.org·2d
🌊Stream Ciphers
There's something off in the "dev with AI or die" narrative
dev.to·9h·
Discuss: DEV
📏Code Metrics
Context Misleads LLMs: The Role of Context Filtering in Maintaining Safe Alignment of LLMs
arxiv.org·5d
💻Local LLMs
From Grep to ast-grep: Building XRAY MCP for Code-Aware AI
dev.to·3d·
Discuss: DEV
🌳Incremental Parsing
Databricks: Recognizing and avoiding security vulnerabilities in vibe coding
heise.de·5d
📜Proof Carrying Code
Man-in-the-Prompt: The invisible attack threatening ChatGPT and other AI systems
securityaffairs.com·3d
🔓Hacking
U.S. CISA adds Trend Micro Apex One flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.com·22h
🔓Hacking
Models are smart enough, your process isn't
sibylline.dev·1d·
Discuss: Hacker News
⚡Proof Automation
Loading...Loading more...
AboutBlogChangelogRoadmap