🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔒 WASM Capabilities

Object Capabilities, Sandboxing, Security Models, Module Composition

Uncertain< T >: A First-Order Type for Uncertain Data (2014)
microsoft.com·1d·
Discuss: Hacker News
🧪Binary Fuzzing
Linux Foundation says yes to NoSQL via DocumentDB
theregister.com·10h·
Discuss: Hacker News
🔓Open Source Software
A brief intro to threat modeling
shehackspurple.ca·3d·
Discuss: Hacker News
🎯Threat Hunting
WOMAC: A Mechanism For Prediction Competitions
arxiv.org·2h
🔲Cellular Automata
Certificates and Witnesses for Multi-objective {\omega}-regular Queries in Markov Decision Processes
arxiv.org·2h
🎯Performance Proofs
Custom slash commands in Claude Code
boliv.substack.com·2d·
Discuss: Substack
⚔️Lean Tactics
A Defect Classification Framework for AI-Based Software Systems (AI-ODC)
arxiv.org·2h
👁️System Observability
Making Games in Go: 3 Months Without LLMs vs. 3 Days with LLMs
marianogappa.github.io·1d·
Discuss: Hacker News, r/programming
🧩WASM Components
Using Gemini CLI as a Subagent for Claude Code
aicodingtools.blog·17h·
Discuss: Hacker News
⚡Proof Automation
The MCP Threat Landscape: Security Risks Every Developer Must Know
dev.to·14h·
Discuss: DEV
📦Container Security
GitOps Principles: The Future of Declarative Infrastructure and Deployment
blog.devops.dev·18h
🧱Immutable Infrastructure
A Bitcoin Core Code Analysis
binaryigor.com·15h·
Discuss: Hacker News
🧬Bitstream Evolution
Build and deploy small AI models from the browser
blog.minibase.ai·15h·
Discuss: Hacker News
🌀Brotli Internals
Securing Heterogeneous Network (HetNet) Communications for Wildfire Management: Mitigating the Effects of Adversarial and Environmental Threats
arxiv.org·2h
🕸️Mesh Networking
The Day I Logged in with a Hash
gsociety.fr·1d·
Discuss: Hacker News
🔓Hacking
How Should a CMS Repository Understand the Content Within It?
deanebarker.net·2d·
Discuss: Hacker News
🗄️Database Internals
Safe Is What We Call Things Later: Some Software Engineering Folklore
worksonmymachine.ai·1d·
Discuss: Hacker News
⚙️Proof Engineering
Go’s unsafe: Unlocking Performance Hacks with a Risk
dev.to·14h·
Discuss: DEV
🔒Type Safety
Go Beyond Viper and Cobra: Declarative Field-Driven Configuration for Go Apps
dev.to·3d·
Discuss: DEV
📋Format Specification
Muhammad Azeez - The Agent Builder's Reading List: What Actually Matters
mazeez.dev·19h·
Discuss: Hacker News, r/programming
⚔️Lean Tactics
Loading...Loading more...
AboutBlogChangelogRoadmap