Article URL: https://docs.carbon-lang.dev/
Comments URL: https://news.ycombinator.com/item?id=44745984
Points: 39
# Comments: 20

Article URL: https://arxiv.org/abs/2507.22358
Comments URL: https://news.ycombinator.com/item?id=44746321
Points: 20
# Comments: 4

Article URL: https://streamnative.io/products/ursa
Comments URL: https://news.ycombinator.com/item?id=44746415
Points: 50
# Comments: 14

Article URL: https://lazyadmin.nl/home-network/unifi-os-server/
Comments URL: https://news.ycombinator.com/item?id=44746603
Points: 56
# Comments: 22
Article URL: https://worrydream.com/dbx/
Comments URL: https://news.ycombinator.com/item?id=44746821
Points: 18
# Comments: 2
Article URL: https://lwn.net/Articles/1029851/
Comments URL: https://news.ycombinator.com/item?id=44746948
Points: 54
# Comments: 10
Article URL: https://neurofrontiers.blog/book-review-how-not-to-study-a-disease/
Comments URL: https://news.ycombinator.com/item?id=44747004
Points: 10
# Comments: 4
https://neurofrontiers.blog/book-review-how-not-to-study-a-disease/

Hey HN, I'm JJ, Co-Founder of Gecko Security (https://www.gecko.security). We're building a new kind of static analysis tool that uses LLMs to find complex business logic and multi-step vulnerabilities that current scanners miss. We’ve used it to find 30+ CVEs in projects like Ollama, Gradio, and Ragflow (https://www.gecko.security/research). You can try it yourself on any OSS repo at (