🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ WebAssembly Security

Sandboxing, Capability Systems, Memory Safety, Browser Isolation

Replacing Client-side JavaScript SDKs with WebAssembly Components at the Edge
fastly.com·1d·
Discuss: Hacker News
🕸️WebAssembly
Critical Security Importance Digital Age Web Techniques(1750818928214500)
dev.to·19h·
Discuss: DEV
🔒WASM Capabilities
Privilege Escalation Vulnerabilities (CVE-2025-46415, CVE-2025-46416)
guix.gnu.org·1d
💣ZIP Vulnerabilities
[$] Libxml2's "no security embargoes" policy
lwn.net·6h
🔓Free and open source
Speculative Optimizations for WebAssembly using Deopts and Inlining
v8.dev·1d·
Discuss: Hacker News, r/javascript, r/webdev
🦀Rust Macros
My AI Workflow for Understanding Any Codebase
steipete.me·11h
⚡Proof Automation
Program Execution, follow-up
windowsir.blogspot.com·10h·
Discuss: www.blogger.com
⚡Performance Tools
Why Single-Tenant Applications Are Better Than Multi-Tenant SaaS
fusionauth.io·24m·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
Considering making a home server, talk me in or out of it, and help me decide on parts...
reddit.com·11h·
Discuss: r/homelab
🏠HomeLab
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·10h
🦠Malware Analysis
Networks aren’t fragile because of change, they’re fragile because they change without structure
techradar.com·8h
🤖Network Automation
How to (Almost) solve cybersecurity once and for all
adaptive.live·1d·
Discuss: Hacker News
🔐Systems Hardening
C compiler for Web Assembly (c4wa)
github.com·1d·
Discuss: Hacker News
🌐WASI
Ultimate Lab Resource for VCF 9.0
williamlam.com·1h
🏠HomeLab
N8N, Local LLM, MCP proxy in 1 compose file
ajeetraina.com·1d·
Discuss: Hacker News
🏠Homelab Orchestration
The collective waste caused by poor documentation
shanrauf.com·20h·
Discuss: Hacker News
📦Deflate
Disney+ Using Rust!
medium.com·4h
🎬WebCodecs API
Building Scalable Web Applications with Advanced JavaScript Patterns
dev.to·2h·
Discuss: DEV
🛠Language Design
AI Security Posture Management (AISPM): How to Handle AI Agent Security
hackernoon.com·15h
🎯Threat Hunting
Generative AI Exacerbates Software Supply Chain Risks
darkreading.com·8h
🔒WASM Capabilities
Loading...Loading more...
AboutBlogChangelogRoadmap