Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
⛓️ Blockchain Security
Smart Contract Audits, DeFi Exploits, Consensus Attacks
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
8012
posts in
227.0
ms
Toward Quantum-Safe Software Engineering: A Vision for Post-Quantum
Cryptography
Migration
arxiv.org
·
3d
⚛️
Quantum Security
SPEAR
: An Engineering Case Study of Multi-Agent Coordination for Smart Contract
Auditing
arxiv.org
·
4d
👁️
Observability
Adaptive
Neuro-Symbolic
Planning for smart agriculture
microgrid
orchestration in hybrid quantum-classical pipelines
dev.to
·
1d
·
Discuss:
DEV
🏹
Effect Systems
Production pain points and coordination patterns from building a
dual-orchestrator
(Claude + Kimi) system on Claude Code. 8 failure modes with specs and
invariants
.
gist.github.com
·
1d
·
Discuss:
Hacker News
👁️
Observability
Building a scalable code
modernization
solution with AWS
Transform
custom
aws.amazon.com
·
2d
🏛️
Technical Architecture
Multi-Paxos
– Consensus in Distributed
Databases
arpitbhayani.me
·
2d
·
Discuss:
Hacker News
☁️
Cloud Security
Building "zero-gap"
secrets
for a
UGC
platform
news.ycombinator.com
·
2d
·
Discuss:
Hacker News
⚛️
Quantum Security
Show HN: We
audited
AI agent
configs
on GitHub. Every one had security issues
clawhatch.com
·
1d
·
Discuss:
Hacker News
🛡️
AI Security
Stablecoins vs.
Tokenized
Deposits
: The Narrow Banking Debate Revisited
fedinprint.org
·
3d
·
Discuss:
Hacker News
⚛️
Quantum Security
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
3d
·
Discuss:
Hacker News
☁️
Cloud Security
Anatomy
of a
5-Layer
Defence Pipeline for AI Agent Memory
dev.to
·
1d
·
Discuss:
DEV
🛡️
AI Security
CISA flags critical
SolarWinds
RCE
flaw as exploited in attacks
bleepingcomputer.com
·
5d
🛠️
Product Security
Facing the Quantum Threat:
Cisco
’s Strategic Approach to
PQC
blogs.cisco.com
·
3d
⚛️
Quantum Security
akshat666/ephemeral-first-security-framework
: Security through
transience
, not just encryption
github.com
·
5d
·
Discuss:
Hacker News
☁️
Cloud Security
Rethinking Time in
Computation
– From Wall
Clocks
to State Transitions
d1gesto.blogspot.com
·
2d
·
Discuss:
Hacker News
⚛️
Quantum Security
The Security
Gap
in MCP: The Hidden Risks No One Is
Talking
About
memgraph.com
·
2d
·
Discuss:
Hacker News
⚛️
Quantum Security
Evaluating
and
mitigating
the growing risk of LLM-discovered 0-days
red.anthropic.com
·
3d
·
Discuss:
Lobsters
,
Hacker News
,
Hacker News
🛠️
Product Security
The
Masked
Namespace
Vulnerability in Temporal CVE-2025-14986
depthfirst.com
·
2d
·
Discuss:
Hacker News
☁️
Cloud Security
Token
Smuggling
:How Non-Standard
Encoding
Bypass AI Security
instatunnel.my
·
2d
·
Discuss:
Hacker News
,
r/programming
🛡️
AI Security
The methodology behind the LLM contamination paper getting
sustained
cloning
adversarialbaseline.substack.com
·
3d
·
Discuss:
Substack
🛡️
AI Security
Loading...
Loading more...
« Page 1
•
Page 3 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help