Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🧮 Z3
Specific
SMT Solver, Theorem Proving, Constraint Solving, Verification
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
7351
posts in
16.1
ms
A
Dumb
Introduction to
z3
🧮
Z3 Solver
ar-ms.me
·
1d
·
Lobsters
,
Hacker News
A simple test-time method that beats Claude
Mythos
on
Terminal-Bench
✓
Automated Theorem Proving
llm-as-a-verifier.notion.site
·
4h
·
Hacker News
The Lean Programming Language and
Theorem
Prover
🧮
Lean4
leodemoura.github.io
·
3d
·
Hacker News
Multi-agent AI
orchestration
built for
governance
, in Rust
🌐
ActivityPub
broodlink.ai
·
9h
·
Hacker News
From
Indiscriminate
to Targeted: Efficient RTL Verification via
Functionally
Key Signal-Driven LLM Assertion Generation
🔍
Formal Verification
arxiv.org
·
1d
S.A.F.E.:
RFC-style
intent checks for
privileged
AI automation
🛡️
seL4
zenodo.org
·
27m
·
Hacker News
From
bytecode
to bytes: automated magic
packet
generation
🌐
NetworkProtocols
blog.cloudflare.com
·
6d
·
Hacker News
AeneasVerif/aeneas
: A verification
toolchain
for Rust programs
🏗️
Dune
github.com
·
2d
·
Hacker News
NK-CAPTCHA
- Nation State Actor Verification
🔒
Protocol Verification
nkcaptcha.com
·
17h
·
Hacker News
Show HN: AI Content
Attestation
& Verification w/
Revocable
Signatures
🔒
Protocol Verification
lyfe.ninja
·
1d
·
Hacker News
Shipping faster, thinking less? The AI code
verification
trap
🤖
Program Synthesis
leaddev.com
·
5d
·
Hacker News
Roblox
will need age verification to make
sure
you’re at least 9 years old
🎮
Verification Games
theverge.com
·
1d
I Ran My
KYB
Engine at Three
Quantization
Levels. Accuracy Didn't Move. Cost Dropped 6x.
📊
Runtime Verification
walsenburgtech.com
·
5d
·
Hacker News
Critical flaw in
wolfSSL
library enables
forged
certificate use
🔒
Protocol Verification
bleepingcomputer.com
·
1d
·
Hacker News
Verification
Debt Is Your Next
Headache
✓
Automated Theorem Proving
leadership.garden
·
6d
·
Hacker News
Show HN: I built an open
protocol
for Agent-to-agent commercial
negotiation
🌐
NetworkProtocols
a2cn.io
·
6d
·
Hacker News
Solus
and Age
Verification
🔒
Protocol Verification
getsol.us
·
6d
·
Hacker News
explainers-by-googlers/private-verification-tokens
: Private Verification Tokens (PVT) is a low-entropy mechanism for users to transfer the trust they have established in regular browsing into private browsing mode to reduce their experienced friction
🔒
Protocol Verification
github.com
·
23h
·
Hacker News
Is there a path to
Gamification
of
Verification
?
🎮
Verification Games
olshansky.info
·
6d
·
Hacker News
CIR
+
CVN
: Bridging LLM Semantic Understanding and Petri-Net Verification for Concurrent Programs
🔍
CBMC
arxiv.org
·
1d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help