Operable Software
ferd.caยท5hยท
Discuss: Hacker News
๐Ÿ‘๏ธSystem Observability
Metasploit Wrap Up 10/09/2025
rapid7.comยท22h
๐Ÿ›ก๏ธeBPF Security
Ensuring Safe and Reliable Updates with Qualys TruRiskโ„ข Manifest Version Control
blog.qualys.comยท1d
โœ…Archive Fixity
A Manifesto for the Programming Desperado
github.comยท3hยท
Discuss: Hacker News
๐Ÿ’ปProgramming languages
When AI Remembers Too Much โ€“ Persistent Behaviors in Agentsโ€™ Memory
unit42.paloaltonetworks.comยท21h
๐Ÿ”ฒCellular Automata
How we built a structured Streamlit Application Framework in Snowflake
about.gitlab.comยท19h
๐ŸŒŠStreaming Systems
Go and PocketBase: Shortified!
dev.toยท2dยท
Discuss: DEV
โšกgRPC
Wasm 3.0: No Component Model and No โ€˜Docker Momentโ€™
thenewstack.ioยท3d
๐ŸงฉWASM Components
The Day I Hacked XCTrack
blog.syrac.orgยท4hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Why โ€˜security as by-productโ€™ is no replacement for modern tooling
reversinglabs.comยท1d
๐Ÿ”Capability Systems
Wallarm: API Security Platform of the Year 2025
lab.wallarm.comยท6h
๐Ÿ”ŒInterface Evolution
Microsoft Adds Agentic AI Capabilities to Sentinel
darkreading.comยท3h
๐Ÿ“ŠHomelab Monitoring
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.comยท5h
๐Ÿ”“Hacking
Vulnerability Management โ€“ Requirements, Scoping & Target Setting
blog.nviso.euยท1d
๐Ÿ”Capability Systems
WASM in the Kernel: Tales of Triumph and Trouble
riptides.ioยท4dยท
Discuss: Hacker News
๐Ÿ•ธ๏ธWASM Archives
Intent Weaving for AI Coding Agents
autohand.aiยท16hยท
Discuss: Hacker News
โšกProof Automation
Modern C and initializing an array
subethasoftware.comยท1d
๐Ÿ—‚Data structures
Three ways formally verified code can go wrong in practice
buttondown.comยท1h
๐Ÿ“œProof Carrying Code
Erlang-Red Walkthrough โ€“ Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.comยท5hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis