eBPF Rootkit
synacktiv.comΒ·12hΒ·
Discuss: Hacker News
πŸ›‘οΈeBPF Security
Flag this post
WebAssembly Still Expanding Frontend Uses 10 Years Later
thenewstack.ioΒ·13h
πŸ•ΈοΈWebAssembly
Flag this post
Python Registry Pattern: A Clean Alternative to Factory Classes
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”CBOR
Flag this post
The Agentic AI Security Scoping Matrix: A framework for securing autonomous AI systems
aws.amazon.comΒ·1d
πŸ”Capability Systems
Flag this post
A WebAssembly Interpreter
wasmgroundup.comΒ·2dΒ·
Discuss: Hacker News
🌐WASI
Flag this post
Olmo 3 is a fully open LLM
simonwillison.netΒ·5h
πŸŒ€Brotli Internals
Flag this post
Meet the SWHID: The end of broken links, broken builds
softwareheritage.orgΒ·2d
🏺Format Archaeology
Flag this post
PyPitfall: Dependency Chaos and Software Supply Chain Vulnerabilities in Python
nocomplexity.substack.comΒ·17hΒ·
Discuss: Substack
πŸ”—Dependency Resolution
Flag this post
Process Archetypes: The Roles in the Gnome Village
happihacking.comΒ·2d
🐚Bash Monads
Flag this post
Architecting Uncertainty: Designing Reliable Systems on Top of LLMs
medium.comΒ·1dΒ·
Discuss: Hacker News
🧩WASM Components
Flag this post
No Deus ex Machina
thestoicprogrammer.substack.comΒ·20hΒ·
Discuss: Substack
πŸ”©Systems Programming
Flag this post
The Limits of Formal Security Models – Dorothy E. Denning (1999)
faculty.nps.eduΒ·3dΒ·
Discuss: Hacker News
πŸ”Cryptographic Archaeology
Flag this post
Show HN: GuardiAgent – Sandboxing / permission model for MCP servers
guardiagent.comΒ·1dΒ·
Discuss: Hacker News
πŸ›‘οΈCLI Security
Flag this post
Dingo: A Meta-Language for Go
github.comΒ·4hΒ·
πŸ¦€Rust Macros
Flag this post
The Loss of Control Playbook: Degrees, Dynamics, and Preparedness
arxiv.orgΒ·2d
πŸ”²Cellular Automata
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
stack.int.movΒ·8hΒ·
Discuss: Hacker News
πŸ”ŒOperating system internals
Flag this post
OWASP Top 10 tackles supply chain risk
reversinglabs.comΒ·2d
πŸ”Capability Systems
Flag this post
AI Agent Security: Why Reliability Is the Missing Defense Against Data
composio.devΒ·1dΒ·
Discuss: Hacker News
πŸ›‘οΈError Boundaries
Flag this post
Mad drunk on the mead of poetry
blog.zarfhome.comΒ·1d
πŸ§ͺCBOR Fuzzing
Flag this post