๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”’ WASM Capabilities

Object Capabilities, Sandboxing, Security Models, Module Composition

Encapsulation Isn't Java's Fault (and Python Needs It Too)
lihil.ccยท2hยท
Discuss: Hacker News
๐Ÿ”CBOR
LLMs Can Covertly Sandbag on Capability Evaluations Against Chain-of-Thought Monitoring
arxiv.orgยท18h
๐ŸŽฏThreat Hunting
Case study: enhancing SBOMs with cdsbom at the Linux Foundation
opensource.orgยท8h
๐Ÿ”“Open Source Software
Analysing Snapshot Isolation
muratbuffalo.blogspot.comยท9hยท
Discuss: www.blogger.com
๐ŸŒณPersistent Data Structures
Cybersecurity Instruction Tuned Model
huggingface.coยท19hยท
Discuss: Hacker News
๐Ÿ”’Language-based security
Detection Engineering: Practicing Detection-as-Code โ€“ Validation โ€“ Part 3
blog.nviso.euยท15h
โœ…Archive Validation
AI agents, part 3: Adaptive designs optimize development and user experience
heise.deยท13h
โšกIncremental Computation
Week 7 โ€” Learning Basic Concepts of Cybersecurity
infosecwriteups.comยท1d
๐Ÿ”Capability Systems
Machine Learning Fundamentals: model evaluation example
dev.toยท6hยท
Discuss: DEV
๐Ÿ‘๏ธObservatory Systems
In Cybersecurity, We Have to Work Together
tenable.comยท12h
๐Ÿ”“Hacking
We Built an MCP Server and These Are the Gotchas Nobody Talks About
cloudquery.ioยท7hยท
Discuss: Hacker News
๐Ÿ”—Constraint Handling
Endor: Fire up a Dev Environment in Seconds With WebAssembly
thenewstack.ioยท1h
๐ŸŒWASI
OWASP ASVS 5.0.0 is here!
scotthelme.ghost.ioยท1d
๐Ÿ›ก๏ธWASM Sandboxing
Empowering cybersecurity product managers with LangChain
datasciencecentral.comยท1h
๐Ÿ”Capability Systems
Amp Code: Arbitrary Command Execution via Prompt Injection Fixed
embracethered.comยท9h
๐Ÿ›ก๏ธCLI Security
Learning About Threads: An Essential Guide for Developers
hackernoon.comยท10h
๐Ÿ”ฉSystems Programming
Running C++ on Cloudflare WASM
saus.appยท2dยท
Discuss: Hacker News
๐ŸงฉWASM Components
Nonsense and Malicious Packages: LLM Hallucinations in Code Generation
cacm.acm.orgยท2h
๐Ÿ”“Hacking
We trained LLM to find reentrancy vulnerabilities in smart contracts
blog.unvariant.ioยท7hยท
Discuss: Hacker News
๐ŸงชBinary Fuzzing
The New Security Advantage: Crowdsourced Security in the Age of AI
hackerone.comยท9h
๐ŸŽฏThreat Hunting
Loading...Loading more...
AboutBlogChangelogRoadmap