<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://appsecuritystandards.org/</loc></url>
  <url><loc>https://appsecuritystandards.org/glossary</loc></url>
  <url><loc>https://appsecuritystandards.org/glossary/ai-agent-security</loc><lastmod>2026-04-19T04:03:58.408Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/ai-red-teaming</loc><lastmod>2026-04-19T04:24:59.180Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/api-abuse</loc><lastmod>2026-04-18T17:52:10.839Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/api-discovery</loc><lastmod>2026-04-18T18:01:17.277Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/api-enumeration</loc><lastmod>2026-04-18T17:56:29.570Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/api-gateway</loc><lastmod>2026-04-19T10:51:51.366Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/api-posture-management</loc><lastmod>2026-04-18T18:06:10.928Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/api-schema-validation</loc><lastmod>2026-04-18T15:29:49.628Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/api-security</loc><lastmod>2026-04-19T12:20:43.022Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/abuse-case-modeling</loc><lastmod>2026-04-19T13:06:33.399Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/access-control</loc><lastmod>2026-04-18T16:00:39.180Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/adversarial-machine-learning-attacks</loc><lastmod>2026-04-19T03:57:41.566Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/agent-tool-abuse</loc><lastmod>2026-04-19T04:12:06.297Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/anomaly-detection</loc><lastmod>2026-04-19T03:16:56.367Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/application-detection-and-response</loc><lastmod>2026-04-18T17:13:35.906Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/application-layer-encryption</loc><lastmod>2026-04-19T00:44:52.146Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/application-monitoring</loc><lastmod>2026-04-19T02:47:10.405Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/application-risk</loc><lastmod>2026-04-19T12:42:36.221Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/application-security</loc><lastmod>2026-04-18T14:25:42.399Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/application-security-posture-management</loc><lastmod>2026-04-19T12:58:39.496Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/artifact-registry-security</loc><lastmod>2026-04-19T10:40:48.230Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/artifact-signing</loc><lastmod>2026-04-19T13:38:41.762Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/artificial-intelligence-security</loc><lastmod>2026-04-19T03:32:02.904Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/attack-path</loc><lastmod>2026-04-18T14:55:11.638Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/attack-path-analysis</loc><lastmod>2026-04-18T14:59:46.638Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/attack-surface</loc><lastmod>2026-04-18T14:53:31.519Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/attack-vector</loc><lastmod>2026-04-18T15:04:48.228Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/attribute-based-access-control</loc><lastmod>2026-04-18T16:06:38.628Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/audit-logging</loc><lastmod>2026-04-19T12:44:16.411Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/authentication</loc><lastmod>2026-04-19T13:54:23.138Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/authorization</loc><lastmod>2026-04-18T15:56:06.315Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/autonomous-agent-risk</loc><lastmod>2026-04-19T13:09:59.690Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/breach-and-attack-simulation</loc><lastmod>2026-04-19T14:15:46.095Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/broken-access-control</loc><lastmod>2026-04-19T01:35:45.085Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/broken-authentication</loc><lastmod>2026-04-19T01:34:14.488Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/broken-function-level-authorization</loc><lastmod>2026-04-18T18:17:38.657Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/broken-object-level-authorization</loc><lastmod>2026-04-18T18:14:39.827Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/brute-force-attack</loc><lastmod>2026-04-19T13:32:04.066Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/bug-bounty-programs</loc><lastmod>2026-04-19T04:49:50.571Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/build-provenance</loc><lastmod>2026-04-18T21:07:27.763Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/build-security</loc><lastmod>2026-04-19T12:26:14.272Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/business-logic-attacks</loc><lastmod>2026-04-18T15:40:33.054Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/business-logic-vulnerabilities</loc><lastmod>2026-04-19T01:49:04.985Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/cicd-security</loc><lastmod>2026-04-18T19:01:24.771Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/cache-poisoning</loc><lastmod>2026-04-19T10:39:12.851Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/clickjacking</loc><lastmod>2026-04-19T01:46:05.599Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/cloud-identity-and-access-management</loc><lastmod>2026-04-18T23:34:06.896Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/cloud-security-posture-management</loc><lastmod>2026-04-18T22:37:12.060Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/cloud-workload-protection-platform</loc><lastmod>2026-04-18T22:41:38.274Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/cloud-native-application-protection-platform</loc><lastmod>2026-04-19T14:08:17.196Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/cloud-native-security</loc><lastmod>2026-04-18T22:33:57.496Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/code-signing</loc><lastmod>2026-04-18T21:02:28.330Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/command-injection</loc><lastmod>2026-04-19T01:19:07.860Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/common-vulnerabilities-and-exposures</loc><lastmod>2026-04-18T21:36:26.112Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/common-vulnerability-scoring-system</loc><lastmod>2026-04-18T21:40:17.317Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/compensating-controls</loc><lastmod>2026-04-18T16:51:24.572Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/compliance-as-code</loc><lastmod>2026-04-19T10:57:19.836Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/configuration-drift</loc><lastmod>2026-04-18T19:45:16.267Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/container-escape</loc><lastmod>2026-04-18T23:00:30.299Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/container-hardening</loc><lastmod>2026-04-18T23:05:44.241Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/container-security</loc><lastmod>2026-04-18T22:58:42.848Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/content-security-policy</loc><lastmod>2026-04-19T02:05:31.947Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/continuous-compliance</loc><lastmod>2026-04-19T04:37:29.025Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/continuous-security-validation</loc><lastmod>2026-04-19T03:28:25.575Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/control-mapping</loc><lastmod>2026-04-19T04:29:22.905Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/cookie-security</loc><lastmod>2026-04-19T02:25:50.466Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/coordinated-vulnerability-disclosure</loc><lastmod>2026-04-19T12:27:37.012Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/credential-stuffing</loc><lastmod>2026-04-18T18:48:12.183Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/cross-origin-resource-sharing</loc><lastmod>2026-04-19T11:50:38.908Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/cross-site-request-forgery</loc><lastmod>2026-04-19T01:26:14.905Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/cross-site-scripting</loc><lastmod>2026-04-19T01:24:47.332Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/data-access-auditing</loc><lastmod>2026-04-19T00:26:42.074Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/data-classification</loc><lastmod>2026-04-19T00:01:19.438Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/data-loss-prevention</loc><lastmod>2026-04-19T00:07:56.535Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/data-masking</loc><lastmod>2026-04-19T00:14:25.841Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/data-minimization</loc><lastmod>2026-04-19T00:24:50.065Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/data-poisoning</loc><lastmod>2026-04-19T03:47:02.521Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/data-protection</loc><lastmod>2026-04-19T00:06:08.286Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/defense-in-depth</loc><lastmod>2026-04-18T16:43:26.161Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/dependency-confusion</loc><lastmod>2026-04-18T20:28:49.446Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/dependency-management</loc><lastmod>2026-04-18T20:20:24.315Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/dependency-pinning</loc><lastmod>2026-04-18T20:33:51.629Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/dependency-scanning</loc><lastmod>2026-04-18T20:25:21.800Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/deserialization-attacks</loc><lastmod>2026-04-19T01:43:06.586Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/detection-engineering</loc><lastmod>2026-04-19T03:09:43.944Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/developer-security-training</loc><lastmod>2026-04-18T17:40:33.347Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/development-security-and-operations</loc><lastmod>2026-04-18T18:59:39.722Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/directory-traversal</loc><lastmod>2026-04-19T01:44:34.797Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/drift-detection</loc><lastmod>2026-04-18T19:50:11.264Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/dynamic-application-security-testing</loc><lastmod>2026-04-19T11:01:14.045Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/encryption-key-rotation</loc><lastmod>2026-04-19T00:54:26.660Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/encryption-at-rest</loc><lastmod>2026-04-19T00:36:45.241Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/encryption-in-transit</loc><lastmod>2026-04-19T00:41:52.282Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/environment-isolation</loc><lastmod>2026-04-18T20:02:48.994Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/ephemeral-workloads</loc><lastmod>2026-04-18T23:29:21.473Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/exploit-chaining</loc><lastmod>2026-04-18T22:09:14.625Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/exploit-prediction-scoring-system</loc><lastmod>2026-04-18T21:43:23.888Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/exploitability</loc><lastmod>2026-04-19T11:56:05.175Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/exposure-management</loc><lastmod>2026-04-18T15:15:57.637Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/exposure-validation</loc><lastmod>2026-04-18T15:19:27.340Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/false-negatives</loc><lastmod>2026-04-18T22:20:04.998Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/false-positives</loc><lastmod>2026-04-19T13:30:19.842Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/fine-grained-authorization</loc><lastmod>2026-04-18T16:09:47.816Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/function-as-a-service-security</loc><lastmod>2026-04-18T23:20:56.593Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/fuzz-testing</loc><lastmod>2026-04-19T13:00:23.626Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/graphql-introspection-abuse</loc><lastmod>2026-04-18T15:42:57.070Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/graphql-security</loc><lastmod>2026-04-19T13:01:48.384Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/http-request-smuggling</loc><lastmod>2026-04-19T13:36:47.828Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/hallucination-exploitation</loc><lastmod>2026-04-19T04:20:18.131Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/host-header-injection</loc><lastmod>2026-04-19T02:02:13.523Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/ide-security-plugins</loc><lastmod>2026-04-18T17:39:09.248Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/identity-federation</loc><lastmod>2026-04-18T16:11:10.341Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/identity-threat-detection-and-response</loc><lastmod>2026-04-18T16:16:59.150Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/identity-and-access-management</loc><lastmod>2026-04-18T16:40:19.394Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/image-scanning</loc><lastmod>2026-04-18T23:07:09.596Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/immutable-infrastructure</loc><lastmod>2026-04-18T19:40:24.991Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/indicators-of-attack</loc><lastmod>2026-04-19T02:59:05.404Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/indicators-of-compromise</loc><lastmod>2026-04-19T02:57:33.683Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/infrastructure-as-code-security</loc><lastmod>2026-04-18T19:37:26.587Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/injection-attacks</loc><lastmod>2026-04-19T01:15:36.564Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/insecure-deserialization</loc><lastmod>2026-04-19T01:41:27.313Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/instance-metadata-attacks</loc><lastmod>2026-04-18T23:40:49.005Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/interactive-application-security-testing</loc><lastmod>2026-04-18T17:24:02.724Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/json-web-token</loc><lastmod>2026-04-19T12:55:44.936Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/jailbreaking</loc><lastmod>2026-04-19T03:59:12.677Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/just-enough-access</loc><lastmod>2026-04-19T13:21:17.764Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/just-in-time-access</loc><lastmod>2026-04-18T18:07:35.521Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/key-management</loc><lastmod>2026-04-19T13:17:09.744Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/kill-chain</loc><lastmod>2026-04-18T15:06:30.082Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/known-exploited-vulnerabilities</loc><lastmod>2026-04-18T21:48:55.610Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/kubernetes-security</loc><lastmod>2026-04-19T13:34:18.553Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/large-language-model-security</loc><lastmod>2026-04-19T03:37:44.032Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/lateral-movement</loc><lastmod>2026-04-19T02:45:33.981Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/least-privilege</loc><lastmod>2026-04-18T16:30:26.993Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/lockfiles</loc><lastmod>2026-04-18T20:35:30.837Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/machine-identity-management</loc><lastmod>2026-04-18T16:18:42.544Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/maintainer-account-takeover</loc><lastmod>2026-04-18T20:47:08.497Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/malicious-packages</loc><lastmod>2026-04-18T20:42:15.761Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/man-in-the-middle-attack</loc><lastmod>2026-04-19T02:36:55.098Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/membership-inference-attacks</loc><lastmod>2026-04-19T03:56:06.465Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/memory-corruption</loc><lastmod>2026-04-19T05:07:43.183Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/memory-safety</loc><lastmod>2026-04-19T13:42:35.865Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/microsegmentation</loc><lastmod>2026-04-19T13:52:23.643Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/misuse-cases</loc><lastmod>2026-04-19T14:04:23.316Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/model-drift</loc><lastmod>2026-04-19T04:15:00.884Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/model-inversion-attacks</loc><lastmod>2026-04-19T03:50:03.422Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/model-security</loc><lastmod>2026-04-19T03:42:31.825Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/model-supply-chain-security</loc><lastmod>2026-04-19T03:44:06.160Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/multi-factor-authentication</loc><lastmod>2026-04-18T18:38:02.042Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/network-segmentation</loc><lastmod>2026-04-19T11:38:20.367Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/oauth</loc><lastmod>2026-04-18T18:19:29.604Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/owasp-api-security-top-10</loc><lastmod>2026-04-19T13:04:58.928Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/open-redirect</loc><lastmod>2026-04-19T02:00:06.053Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/openid-connect</loc><lastmod>2026-04-18T18:22:48.025Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/output-filtering</loc><lastmod>2026-04-19T04:23:29.513Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/pasta</loc><lastmod>2026-04-19T11:24:19.803Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/package-integrity</loc><lastmod>2026-04-19T11:49:06.994Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/parameter-pollution</loc><lastmod>2026-04-19T02:03:52.756Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/password-spraying</loc><lastmod>2026-04-18T18:54:30.587Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/penetration-testing</loc><lastmod>2026-04-18T17:29:00.345Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/personally-identifiable-information</loc><lastmod>2026-04-19T01:03:17.437Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/pipeline-security</loc><lastmod>2026-04-18T19:03:26.552Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/policy-enforcement</loc><lastmod>2026-04-19T12:34:36.761Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/policy-as-code</loc><lastmod>2026-04-18T19:28:49.276Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/pre-commit-hooks</loc><lastmod>2026-04-18T17:37:11.772Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/privacy-by-design</loc><lastmod>2026-04-19T00:32:05.154Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/privilege-escalation</loc><lastmod>2026-04-19T02:44:00.125Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/privileged-access-management</loc><lastmod>2026-04-18T16:34:56.070Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/prompt-injection</loc><lastmod>2026-04-19T03:39:23.919Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/provenance-attestation</loc><lastmod>2026-04-18T21:13:26.296Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/purple-teaming</loc><lastmod>2026-04-19T03:22:06.468Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/race-conditions</loc><lastmod>2026-04-19T01:50:53.163Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/rate-limit-bypass</loc><lastmod>2026-04-18T15:46:01.814Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/rate-limiting</loc><lastmod>2026-04-18T15:44:29.352Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/reachability-analysis</loc><lastmod>2026-04-18T22:10:40.554Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/remote-code-execution</loc><lastmod>2026-04-19T01:32:29.012Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/replay-attack</loc><lastmod>2026-04-19T02:40:43.913Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/reproducible-builds</loc><lastmod>2026-04-18T21:19:55.045Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/responsible-disclosure</loc><lastmod>2026-04-19T04:54:22.974Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/retrieval-augmented-generation-security</loc><lastmod>2026-04-19T04:02:35.364Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/risk-acceptance</loc><lastmod>2026-04-18T22:29:00.277Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/risk-prioritization</loc><lastmod>2026-04-18T21:58:39.832Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/risk-based-vulnerability-management</loc><lastmod>2026-04-19T13:23:06.477Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/role-based-access-control</loc><lastmod>2026-04-18T16:04:41.764Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/runtime-application-self-protection</loc><lastmod>2026-04-18T22:48:08.456Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/runtime-detection</loc><lastmod>2026-04-19T03:14:03.391Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/runtime-security</loc><lastmod>2026-04-18T22:46:24.011Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/sbom-enrichment</loc><lastmod>2026-04-18T20:16:49.496Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/sql-injection</loc><lastmod>2026-04-19T01:17:19.869Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/stride</loc><lastmod>2026-04-19T12:15:54.239Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/same-origin-policy</loc><lastmod>2026-04-19T02:31:52.146Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/secrets-management</loc><lastmod>2026-04-18T19:53:11.283Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/secrets-rotation</loc><lastmod>2026-04-19T00:57:46.089Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/secrets-scanning</loc><lastmod>2026-04-19T10:35:32.865Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/secrets-sprawl</loc><lastmod>2026-04-19T14:02:45.350Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/secure-defaults</loc><lastmod>2026-04-19T05:10:56.412Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/secure-software-development-lifecycle</loc><lastmod>2026-04-19T10:37:21.519Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/security-architecture-review</loc><lastmod>2026-04-18T16:52:53.939Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/security-champions-program</loc><lastmod>2026-04-18T17:42:10.598Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/security-code-review</loc><lastmod>2026-04-18T17:30:37.367Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/security-debt</loc><lastmod>2026-04-18T22:24:36.231Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/security-effectiveness</loc><lastmod>2026-04-19T04:45:19.542Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/security-headers</loc><lastmod>2026-04-19T12:23:51.233Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/security-maturity-model</loc><lastmod>2026-04-19T04:40:04.927Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/security-misconfiguration</loc><lastmod>2026-04-18T15:25:00.382Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/security-posture</loc><lastmod>2026-04-19T04:38:38.960Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/security-as-code</loc><lastmod>2026-04-18T19:27:22.320Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/sensitive-data-exposure</loc><lastmod>2026-04-19T10:42:27.699Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/server-side-request-forgery</loc><lastmod>2026-04-19T01:27:46.442Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/serverless-misconfiguration</loc><lastmod>2026-04-19T13:40:36.875Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/serverless-security</loc><lastmod>2026-04-18T23:15:09.544Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/service-accounts</loc><lastmod>2026-04-18T23:39:01.425Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/session-fixation</loc><lastmod>2026-04-18T18:31:24.401Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/session-hijacking</loc><lastmod>2026-04-18T18:33:26.037Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/session-management</loc><lastmod>2026-04-18T18:29:56.065Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/shadow-apis</loc><lastmod>2026-04-18T15:31:41.167Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/shift-left</loc><lastmod>2026-04-18T19:19:32.039Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/shift-right</loc><lastmod>2026-04-18T19:23:59.805Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/sigstore</loc><lastmod>2026-04-18T21:16:34.151Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/single-sign-on</loc><lastmod>2026-04-18T18:43:24.909Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/software-bill-of-materials</loc><lastmod>2026-04-18T20:09:51.758Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/software-composition-analysis</loc><lastmod>2026-04-18T17:25:34.983Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/software-supply-chain</loc><lastmod>2026-04-18T20:04:08.163Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/static-application-security-testing</loc><lastmod>2026-04-18T17:17:35.663Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/subresource-integrity</loc><lastmod>2026-04-19T02:18:55.018Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/supply-chain-risk</loc><lastmod>2026-04-18T20:05:26.778Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/supply-chain-levels-for-software-artifacts</loc><lastmod>2026-04-18T20:11:19.440Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/threat-detection</loc><lastmod>2026-04-19T03:15:27.806Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/threat-hunting</loc><lastmod>2026-04-19T03:04:40.057Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/threat-intelligence-feeds</loc><lastmod>2026-04-19T05:15:22.613Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/threat-modeling</loc><lastmod>2026-04-18T14:32:42.985Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/threat-surface-management</loc><lastmod>2026-04-18T15:10:50.163Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/token-based-authentication</loc><lastmod>2026-04-19T13:50:31.122Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/tokenization</loc><lastmod>2026-04-19T14:18:30.078Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/tool-injection</loc><lastmod>2026-04-19T10:44:22.875Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/trust-boundary</loc><lastmod>2026-04-18T17:06:44.316Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/typosquatting</loc><lastmod>2026-04-19T12:38:38.637Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/vulnerability-exploitability-exchange</loc><lastmod>2026-04-19T12:40:44.416Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/vulnerability-management</loc><lastmod>2026-04-18T21:25:00.835Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/vulnerability-scanning</loc><lastmod>2026-04-18T17:32:08.972Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/web-application-firewall</loc><lastmod>2026-04-18T23:56:33.645Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/web-cache-deception</loc><lastmod>2026-04-19T01:58:26.674Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/workload-identity</loc><lastmod>2026-04-19T12:36:40.817Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/workload-identity-federation</loc><lastmod>2026-04-19T12:18:50.495Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/workload-security</loc><lastmod>2026-04-18T22:53:25.056Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/zero-trust-architecture</loc><lastmod>2026-04-18T16:46:42.971Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/glossary/zombie-apis</loc><lastmod>2026-04-18T15:35:27.180Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog</loc></url>
  <url><loc>https://appsecuritystandards.org/blog/should-your-security-framework-treat-ai-agents-like-users-or-like-code</loc><lastmod>2026-05-03T07:55:02.046Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-identity-verification-failed-against-ai-agents-a-post-mortem</loc><lastmod>2026-05-03T07:55:02.042Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ruby-gems-and-go-modules-turned-weapons-bufferzonecorp-attack-breakdown</loc><lastmod>2026-05-03T07:55:02.037Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/36-hours-a-sql-injection-flaw-goes-from-disclosure-to-active-exploitation</loc><lastmod>2026-05-03T07:55:02.033Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/sql-injection-in-litellm-how-a-9-3-cvss-vulnerability-was-exploited-in-36-hours</loc><lastmod>2026-05-03T07:55:02.029Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/mythos-when-vulnerability-discovery-moved-to-machine-speed</loc><lastmod>2026-05-03T07:55:02.024Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/four-malicious-packages-one-missing-approval-gate</loc><lastmod>2026-05-03T07:55:02.013Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-agents-aren-t-deleting-your-database-your-security-process-is</loc><lastmod>2026-05-03T07:55:02.008Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/two-thirds-of-ai-teams-run-on-kubernetes-here-s-what-that-means-for-your-infrastructure</loc><lastmod>2026-05-03T07:55:02.002Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-agent-leaked-oauth-token-through-screenshot-manipulation</loc><lastmod>2026-05-03T07:55:01.995Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/two-malicious-versions-how-a-stored-api-token-compromised-pypi-s-lightning-package</loc><lastmod>2026-05-02T07:55:01.603Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/cve-2026-41940-when-authentication-bypass-meets-mass-hosting-infrastructure</loc><lastmod>2026-05-02T07:55:01.599Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/two-malicious-pypi-packages-stole-credentials-for-48-hours</loc><lastmod>2026-05-02T07:55:01.596Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/google-gemini-cli-s-10-0-cvss-flaw-what-broke-and-how-to-fix-it</loc><lastmod>2026-05-02T07:55:01.592Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/a-10-0-severity-flaw-in-google-s-gemini-cli-what-failed-and-how-to-fix-it</loc><lastmod>2026-05-02T07:55:01.579Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/two-malicious-pytorch-lightning-versions-slipped-through-pypi-s-gates</loc><lastmod>2026-05-02T07:55:01.574Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/verifying-ai-model-provenance-won-t-solve-your-ai-security-problem</loc><lastmod>2026-05-02T07:55:01.569Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/pytorch-lightning-supply-chain-attack-two-versions-thousands-of-exposed-environments</loc><lastmod>2026-05-02T07:55:01.553Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/four-sap-npm-packages-shipped-malware-for-two-weeks</loc><lastmod>2026-05-01T07:55:01.718Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/how-github-patched-a-critical-rce-in-two-hours</loc><lastmod>2026-05-01T07:55:01.714Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/github-s-rce-vulnerability-when-88-of-self-hosted-instances-miss-critical-patches</loc><lastmod>2026-05-01T07:55:01.710Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/cve-2026-40478-when-framework-misuse-becomes-a-critical-vulnerability</loc><lastmod>2026-05-01T07:55:01.705Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/119-000-downloads-in-three-hours-what-the-ai-dev-tool-attacks-teach-us</loc><lastmod>2026-05-01T07:55:01.700Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/malicious-preinstall-scripts-compromise-sap-development-packages</loc><lastmod>2026-05-01T07:55:01.694Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/your-plugin-vetting-process-doesn-t-work-and-manual-code-review-won-t-fix-it</loc><lastmod>2026-05-01T07:55:01.677Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/public-package-registries-are-not-free-infrastructure</loc><lastmod>2026-04-30T07:55:01.665Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/8-hours-to-steal-cloud-credentials-the-elementary-data-supply-chain-attack</loc><lastmod>2026-04-30T07:55:01.660Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/self-propagating-malware-hides-in-vs-code-extensions</loc><lastmod>2026-04-30T07:55:01.655Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ide-extensions-are-stealing-credentials-and-nobody-s-checking</loc><lastmod>2026-04-30T07:55:01.651Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/litellm-sqli-exploit-36-hours-from-disclosure-to-active-attack</loc><lastmod>2026-04-30T07:55:01.647Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-a-fintech-vendor-gets-ransomware-672-000-people-pay-the-price</loc><lastmod>2026-04-30T07:55:01.642Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/a-single-git-push-could-have-compromised-github-s-entire-backend</loc><lastmod>2026-04-30T07:55:01.637Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/an-ai-agent-deleted-production-data-in-nine-seconds-what-the-incident-data-reveals</loc><lastmod>2026-04-30T07:55:01.627Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/cursor-ide-vulnerability-when-ai-agents-execute-malicious-git-hooks</loc><lastmod>2026-04-30T07:55:01.624Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/unsafe-deserialization-takes-down-robotics-platform-the-lerobot-cve-2026-25874-breakdown</loc><lastmod>2026-04-30T07:55:01.617Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/the-five-ways-you-re-breaking-ai-driven-security-and-how-to-stop</loc><lastmod>2026-04-29T07:55:02.234Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/73-malicious-extensions-sat-dormant-in-openvsx-for-months</loc><lastmod>2026-04-29T07:55:02.229Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/pypi-s-elementary-data-breach-when-ci-cd-becomes-the-attack-surface</loc><lastmod>2026-04-29T07:55:02.225Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/microsoft-s-agent-id-administrator-flaw-a-privilege-escalation-teardown</loc><lastmod>2026-04-29T07:55:02.220Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/checkmarx-github-repository-breach-what-happened-and-how-to-prevent-it</loc><lastmod>2026-04-29T07:55:02.214Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/cryptominers-exploited-two-auth-bypass-flaws-in-qinglong-s-middleware</loc><lastmod>2026-04-29T07:55:02.209Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/short-lived-credentials-won-t-save-you-from-your-real-problem</loc><lastmod>2026-04-29T07:55:02.205Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/open-source-governance-failures-cost-you-audit-compliance</loc><lastmod>2026-04-29T07:55:02.199Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-ai-found-10-000-vulnerabilities-in-your-codebase-and-your-team-had-capacity-for-200</loc><lastmod>2026-04-29T07:55:02.194Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/73-malicious-vs-code-extensions-were-installed-before-anyone-noticed</loc><lastmod>2026-04-29T07:55:02.187Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/wait-our-security-scanner-failed-but-the-build-passed</loc><lastmod>2026-04-28T07:55:02.416Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/20-hours-the-langflow-rce-exploit-timeline</loc><lastmod>2026-04-28T07:55:02.411Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/setting-up-ai-powered-vulnerability-scanning-after-mozilla-s-claude-mythos-success</loc><lastmod>2026-04-28T07:55:02.405Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/google-cloud-vertex-ai-permissions-flaw-when-default-service-agents-become-data-exfiltration-paths</loc><lastmod>2026-04-28T07:55:02.398Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/repository-lockdown-runbook-your-first-hour-response-template</loc><lastmod>2026-04-28T07:55:02.394Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/axios-npm-package-compromised-a-two-hour-window-that-could-have-wrecked-your-pipeline</loc><lastmod>2026-04-28T07:55:02.384Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/axios-npm-hijack-when-18-hours-of-prep-time-beat-your-dependency-checks</loc><lastmod>2026-04-28T07:55:02.380Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/cisco-lost-300-repositories-to-a-malicious-github-action</loc><lastmod>2026-04-28T07:55:02.376Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/two-openai-vulnerabilities-expose-the-input-validation-gap-in-ai-tools</loc><lastmod>2026-04-28T07:55:02.369Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/400-surge-in-critical-security-risks-what-250-organizations-reveal-about-ai-driven-development</loc><lastmod>2026-04-27T07:55:02.375Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/the-trivy-compromise-75-version-tags-poisoned-in-24-hours</loc><lastmod>2026-04-27T07:55:02.372Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/build-your-own-vulnerability-triage-system-before-nist-s-april-15-cutoff</loc><lastmod>2026-04-27T07:55:02.369Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/patching-composer-cve-2026-40176-and-cve-2026-40261-a-48-hour-response-plan</loc><lastmod>2026-04-27T07:55:02.365Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/hardening-open-source-maintainer-accounts-after-the-axios-compromise</loc><lastmod>2026-04-27T07:55:02.361Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/513-000-lines-of-ai-code-leaked-through-a-source-map</loc><lastmod>2026-04-27T07:55:02.356Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/1-700-malicious-packages-how-unc1069-weaponized-four-package-ecosystems</loc><lastmod>2026-04-27T07:55:02.353Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-package-repositories-just-got-weaponized-what-the-xinference-attack-reveals</loc><lastmod>2026-04-27T07:55:02.349Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/cve-data-after-nist-what-your-vulnerability-program-needs-now</loc><lastmod>2026-04-27T07:55:02.346Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/we-just-added-mcp-to-our-agent-how-worried-should-we-be</loc><lastmod>2026-04-27T07:55:02.341Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/prepare-your-development-pipeline-for-eu-cyber-resilience-act-compliance</loc><lastmod>2026-04-27T07:55:02.336Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/21-764-malware-packages-in-90-days-what-npm-s-supply-chain-crisis-teaches-us</loc><lastmod>2026-04-27T07:55:02.332Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-scans-100-000-repositories-in-72-hours-the-prt-scan-attack</loc><lastmod>2026-04-27T07:55:02.327Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-ai-finds-your-cve-before-you-patch-it</loc><lastmod>2026-04-27T07:55:02.322Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/risk-based-vulnerability-triage-after-nist-s-pivot-to-selective-enrichment</loc><lastmod>2026-04-27T07:55:02.317Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/sboms-won-t-save-you-from-supply-chain-risk</loc><lastmod>2026-04-27T07:55:02.312Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/anthropic-s-mcp-vulnerability-when-expected-behavior-means-remote-code-execution</loc><lastmod>2026-04-27T07:55:02.306Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/wait-our-template-engine-can-execute-code</loc><lastmod>2026-04-27T07:55:02.300Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/how-a-compromised-ai-tool-gave-attackers-full-access-to-vercel-s-infrastructure</loc><lastmod>2026-04-27T07:55:02.294Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/bitwarden-cli-trojan-how-a-github-action-became-a-supply-chain-weapon</loc><lastmod>2026-04-27T07:55:02.289Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/a-critical-rmm-flaw-exposes-the-hidden-attack-surface-in-your-supply-chain</loc><lastmod>2026-04-27T07:55:02.283Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/should-you-pin-verify-or-isolate-your-developer-tools</loc><lastmod>2026-04-27T07:55:02.274Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/self-propagating-npm-malware-steals-credentials-publishes-more-malware</loc><lastmod>2026-04-27T07:55:02.269Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-found-10-000-vulnerabilities-in-your-code-now-what</loc><lastmod>2026-04-27T07:55:02.259Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/malicious-npm-package-impersonates-bitwarden-cli-three-attack-vectors-in-one</loc><lastmod>2026-04-26T20:46:52.539Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/stolen-publishing-tokens-how-canistersprawl-turned-npm-maintainers-into-attack-vectors</loc><lastmod>2026-04-26T20:46:50.092Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/how-should-you-authorize-your-ai-agents</loc><lastmod>2026-04-26T20:46:41.009Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/340-gb-stolen-through-a-compromised-security-scanner</loc><lastmod>2026-04-26T20:46:37.202Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/766-next-js-hosts-compromised-through-cve-2025-55182</loc><lastmod>2026-04-26T20:46:34.393Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/our-dependency-got-compromised-what-do-we-actually-do</loc><lastmod>2026-04-26T20:46:32.824Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/axios-npm-breach-100-million-weekly-downloads-compromised-in-three-hours</loc><lastmod>2026-04-26T20:46:31.150Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/claude-found-rce-bugs-in-vim-and-emacs-that-fire-when-you-open-a-file</loc><lastmod>2026-04-26T20:46:28.506Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/350-gb-stolen-through-a-vulnerability-scanner-the-europa-eu-supply-chain-breach</loc><lastmod>2026-04-26T20:46:26.671Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/north-korean-hackers-compromised-axios-npm-packages-for-under-three-hours</loc><lastmod>2026-04-26T20:46:25.930Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/axios-npm-package-breach-when-9-million-weekly-downloads-meet-a-sophisticated-compromise</loc><lastmod>2026-04-26T20:46:24.998Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/axios-attack-300-million-weekly-downloads-minutes-to-detect</loc><lastmod>2026-04-26T20:46:24.168Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/axios-supply-chain-attack-when-account-compromise-hits-100-million-weekly-downloads</loc><lastmod>2026-04-26T20:46:22.665Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/axios-supply-chain-attack-how-300-million-weekly-downloads-nearly-became-a-backdoor</loc><lastmod>2026-04-26T20:46:20.816Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/google-s-antigravity-tool-when-prompt-injection-becomes-remote-code-execution</loc><lastmod>2026-04-26T07:55:02.211Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/should-ai-agents-get-admin-access-the-debate-over-least-privilege-for-autonomous-systems</loc><lastmod>2026-04-26T07:55:02.206Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/6-500-unpatched-activemq-instances-when-ai-finds-flaws-faster-than-you-can-fix-them</loc><lastmod>2026-04-26T07:55:02.203Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/13-hours-an-ssrf-vulnerability-goes-from-disclosure-to-active-exploitation</loc><lastmod>2026-04-26T07:55:02.190Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/malicious-npm-packages-stole-credentials-from-8-000-weekly-downloads</loc><lastmod>2026-04-25T07:53:01.797Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/bitwarden-cli-supply-chain-attack-a-95-minute-window-that-exposed-thousands-of-secrets</loc><lastmod>2026-04-25T07:53:01.788Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/bitwarden-cli-hijacked-for-90-minutes-a-ci-cd-pipeline-breach-teardown</loc><lastmod>2026-04-25T07:53:01.783Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/bitwarden-cli-package-breach-how-a-compromised-github-action-stole-developer-credentials</loc><lastmod>2026-04-25T07:53:01.778Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/hackers-compromised-a-security-tool-to-steal-the-secrets-it-was-scanning</loc><lastmod>2026-04-25T07:53:01.769Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/a-9-3-cvss-vulnerability-that-will-never-be-patched</loc><lastmod>2026-04-24T07:53:02.284Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/16-npm-packages-compromised-in-self-propagating-supply-chain-attack</loc><lastmod>2026-04-24T07:53:02.280Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/an-attacker-executed-code-through-your-ai-agent-and-you-never-saw-it</loc><lastmod>2026-04-24T07:53:02.276Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/your-dependency-update-just-broke-authentication-a-post-patch-validation-checklist</loc><lastmod>2026-04-24T07:53:02.272Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/a-self-propagating-worm-just-proved-your-dependency-security-model-is-broken</loc><lastmod>2026-04-24T07:53:02.268Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/asp-net-core-s-cvss-9-1-privilege-escalation-a-cryptographic-verification-failure</loc><lastmod>2026-04-24T07:53:02.259Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/12-000-flowise-instances-compromised-through-maximum-severity-rce-flaw</loc><lastmod>2026-04-23T07:53:02.356Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/grafana-s-ai-dashboard-flaw-when-llm-integration-bypasses-url-validation</loc><lastmod>2026-04-23T07:53:02.352Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/a-padded-http-request-gave-root-access-docker-cve-2026-34040</loc><lastmod>2026-04-23T07:53:02.349Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/maintainer-impersonation-response-script-for-open-source-projects</loc><lastmod>2026-04-23T07:53:02.346Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/12-000-ai-workflow-instances-running-with-a-known-critical-flaw</loc><lastmod>2026-04-23T07:53:02.342Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/cve-2025-59528-when-a-cvss-10-vulnerability-meets-15-000-exposed-instances</loc><lastmod>2026-04-23T07:53:02.339Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/500-000-vulnerabilities-narrowed-to-14-critical-paths</loc><lastmod>2026-04-23T07:53:02.330Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/10-hours-the-marimo-rce-exploit-timeline</loc><lastmod>2026-04-23T07:53:02.324Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/you-re-probably-misreading-article-5-of-the-eu-ai-act</loc><lastmod>2026-04-22T07:53:01.507Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/under-10-hours-how-an-unauthenticated-rce-became-full-system-compromise</loc><lastmod>2026-04-22T07:53:01.502Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/we-re-drowning-in-cves-what-nist-s-triage-shift-means-for-your-vulnerability-program</loc><lastmod>2026-04-22T07:53:01.498Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/code-signing-certificates-revoked-after-supply-chain-compromise</loc><lastmod>2026-04-22T07:53:01.493Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-the-national-vulnerability-database-stopped-enriching-most-cves</loc><lastmod>2026-04-22T07:53:01.477Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/mapping-security-accountability-across-the-ai-stack</loc><lastmod>2026-04-21T07:53:02.212Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/stop-patching-every-cve-a-checklist-for-impact-based-vulnerability-management</loc><lastmod>2026-04-21T07:53:02.206Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/nist-just-handed-you-the-cve-problem-here-s-what-happened-next</loc><lastmod>2026-04-21T07:53:02.202Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/what-we-re-learning-about-ai-vulnerability-scanners-and-what-we-re-not</loc><lastmod>2026-04-21T07:53:02.194Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/patching-the-protobuf-js-rce-vulnerability-a-step-by-step-response-plan</loc><lastmod>2026-04-20T07:53:02.085Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/91-000-attack-sessions-in-three-months-the-ollama-exposure-problem</loc><lastmod>2026-04-19T07:53:01.900Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/cve-2026-33032-when-an-ai-feature-became-a-remote-code-execution-vector</loc><lastmod>2026-04-18T07:53:02.219Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/prompt-injection-flaws-in-salesforce-agentforce-and-microsoft-copilot-a-security-teardown</loc><lastmod>2026-04-17T07:53:02.056Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/21-764-malicious-packages-the-axios-compromise-and-what-it-reveals-about-your-dependency-chain</loc><lastmod>2026-04-16T07:53:02.080Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/docker-authz-bypass-which-plugin-architecture-should-you-deploy</loc><lastmod>2026-04-14T07:53:01.647Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/north-korean-actors-compromised-axios-npm-package-a-supply-chain-attack-teardown</loc><lastmod>2026-04-13T07:53:02.086Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/integrating-ai-vulnerability-scanners-into-your-security-pipeline</loc><lastmod>2026-04-13T07:53:02.080Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-your-publisher-account-gets-suspended-maintaining-critical-update-channels</loc><lastmod>2026-04-11T07:53:01.693Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/axios-npm-package-hijacked-three-hours-that-exposed-your-dependency-stack</loc><lastmod>2026-04-11T07:53:01.688Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/how-stolen-credentials-turned-github-actions-into-a-malware-factory</loc><lastmod>2026-04-11T07:53:01.683Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/audio-steganography-in-package-attacks-detection-and-response-guide</loc><lastmod>2026-04-11T07:53:01.675Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/36-malicious-npm-packages-deployed-reverse-shells-through-strapi-plugin-typosquatting</loc><lastmod>2026-04-08T07:53:02.343Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/766-hosts-compromised-in-24-hours-the-react2shell-credential-theft-campaign</loc><lastmod>2026-04-07T07:53:02.373Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/security-fix-exists-but-your-users-are-still-vulnerable</loc><lastmod>2026-04-05T07:53:01.636Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/npm-s-axios-package-delivered-cross-platform-rat-through-compromised-maintainer-account</loc><lastmod>2026-04-02T07:53:02.186Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/the-pre-commit-secrets-policy-your-developers-will-actually-use</loc><lastmod>2026-04-01T07:53:01.542Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/should-you-lock-down-your-package-repository-or-monitor-it</loc><lastmod>2026-03-31T07:53:01.982Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/a-security-scanner-becomes-the-attack-vector-the-trivy-supply-chain-breach</loc><lastmod>2026-03-29T07:53:02.270Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/56-of-vulnerable-magento-stores-hit-within-10-days</loc><lastmod>2026-03-28T07:53:01.796Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/4-000-downloads-of-malicious-code-the-cline-npm-package-compromise</loc><lastmod>2026-03-27T07:53:01.684Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-generated-malware-in-your-dependencies-detection-checklist</loc><lastmod>2026-03-27T07:53:01.673Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/authentication-bypass-in-pac4j-jwt-exposes-java-applications</loc><lastmod>2026-03-27T07:53:01.670Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-agent-turned-exfiltration-tool-the-pleasefix-vulnerability</loc><lastmod>2026-03-27T07:53:01.666Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/1-000-saas-environments-compromised-through-a-security-scanner</loc><lastmod>2026-03-27T07:53:01.659Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/15-000-magento-stores-hit-by-defacement-polyshell-vulnerability-teardown</loc><lastmod>2026-03-26T19:52:20.586Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-component-inventory-template-mapping-your-llm-dependencies-in-72-hours</loc><lastmod>2026-03-26T19:50:21.003Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/wait-this-package-is-suddenly-asking-for-what-permissions</loc><lastmod>2026-03-26T19:48:20.754Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/securing-your-dependency-chain-against-malicious-extensions</loc><lastmod>2026-03-26T19:46:22.069Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/appsflyer-sdk-compromise-how-a-marketing-tool-became-a-cryptocurrency-theft-vector</loc><lastmod>2026-03-26T19:44:22.023Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/88-malicious-npm-packages-still-active-what-the-phantomraven-data-tells-us</loc><lastmod>2026-03-26T19:37:20.818Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/stopping-self-spreading-worms-when-you-can-t-kill-the-server</loc><lastmod>2026-03-26T19:37:14.435Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/trivy-scanner-breach-when-32-000-github-stars-became-a-liability</loc><lastmod>2026-03-25T07:53:01.787Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/defending-against-decentralized-malware-what-the-canisterworm-attack-means-for-your-supply-chain</loc><lastmod>2026-03-23T07:53:02.025Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-agents-aren-t-just-fancy-chatbots-5-security-myths-that-will-get-you-breached</loc><lastmod>2026-03-23T07:53:02.017Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/angular-ssr-vulnerability-exposes-internal-networks-through-header-manipulation</loc><lastmod>2026-03-23T07:53:02.002Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-scanners-found-11-000-vulnerabilities-in-30-days-here-s-how-to-deploy-one</loc><lastmod>2026-03-23T07:53:01.981Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-scanner-misses-sql-injection-in-payment-flow-a-case-study-in-tool-limitations</loc><lastmod>2026-03-23T07:53:01.971Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/risk-based-security-without-a-baseline-is-just-theater-with-better-lighting</loc><lastmod>2026-03-23T07:53:01.964Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/package-manager-security-a-four-stage-implementation-playbook</loc><lastmod>2026-03-16T07:53:02.092Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/83-000-downloads-of-a-critical-auth-bypass-in-one-week</loc><lastmod>2026-03-13T07:53:01.491Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/is-your-ai-prompt-security-strategy-just-wishful-thinking</loc><lastmod>2026-03-12T07:53:01.621Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-agent-leaked-customer-pii-through-autonomous-email-actions</loc><lastmod>2026-03-12T07:53:01.617Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/oauth2-proxy-authentication-bypass-a-header-smuggling-breakdown</loc><lastmod>2026-03-12T07:53:01.603Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/malicious-packages-on-packagist-a-detection-and-response-reference</loc><lastmod>2026-03-10T07:53:01.601Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/26-malicious-npm-packages-a-supply-chain-attack-breakdown</loc><lastmod>2026-03-09T14:16:24.184Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/1-45-billion-attacks-how-smbs-became-the-primary-target-for-api-exploits</loc><lastmod>2026-03-09T14:15:04.019Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-ai-pentesting-tools-miss-what-matters-a-burp-ai-case-study</loc><lastmod>2026-03-09T14:14:29.160Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/a-zero-width-space-character-broke-freescout-s-security</loc><lastmod>2026-03-09T14:14:01.677Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/should-you-update-chrome-every-two-weeks</loc><lastmod>2026-03-09T12:34:22.059Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/how-a-platform-team-cut-policy-sprawl-by-60-with-unified-kubernetes-governance</loc><lastmod>2026-03-09T12:32:20.225Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/five-myths-about-banning-ai-enabled-browsers-in-your-organization</loc><lastmod>2026-03-09T12:30:20.902Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/zero-day-in-1-4-billion-devices-the-qualcomm-cve-2026-21385-exploit</loc><lastmod>2026-03-09T12:28:22.911Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/tire-pressure-sensors-are-broadcasting-your-location-a-security-engineer-s-field-guide-to-automotive-iot-vulnerabilities</loc><lastmod>2026-03-09T12:26:22.391Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/open-source-disaster-recovery-tools-won-t-save-you-unless-you-avoid-these-5-mistakes</loc><lastmod>2026-03-09T12:24:29.526Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/cmmc-questions-your-procurement-team-is-actually-asking</loc><lastmod>2026-03-09T12:22:55.392Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/spy-grade-ios-exploit-kit-now-powering-financial-crime</loc><lastmod>2026-03-09T12:22:43.394Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/zero-click-rce-in-freescout-when-your-help-desk-becomes-the-entry-point</loc><lastmod>2026-03-09T12:22:34.423Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/five-myths-blocking-your-ai-model-selection-process</loc><lastmod>2026-03-08T19:20:21.821Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/tuning-ai-response-guardrails-without-breaking-user-trust</loc><lastmod>2026-03-08T19:18:17.468Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/we-generate-sboms-but-nobody-looks-at-them-fixing-the-gap-between-sbom-creation-and-action</loc><lastmod>2026-03-08T19:14:22.508Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-static-scans-miss-the-exploit-path-a-shift-left-failure</loc><lastmod>2026-03-08T19:10:21.214Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/best-buy-cut-false-positives-80-by-moving-security-into-the-ide</loc><lastmod>2026-03-08T19:06:20.495Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/implementing-security-for-ai-assisted-development-a-working-playbook</loc><lastmod>2026-03-08T19:04:17.247Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-appsec-teams-treat-every-critical-alert-the-same</loc><lastmod>2026-03-08T19:00:19.251Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-ai-found-500-vulnerabilities-nobody-asked-for</loc><lastmod>2026-03-08T18:58:20.814Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/two-years-of-ai-infrastructure-exploitation-what-wiz-researchers-found</loc><lastmod>2026-03-08T18:56:22.896Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-coding-tools-just-became-your-supply-chain-s-weakest-link</loc><lastmod>2026-03-08T18:54:20.783Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/developer-security-intelligence-configuration-template</loc><lastmod>2026-03-08T18:52:22.845Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/dependency-management-when-ai-writes-half-your-code</loc><lastmod>2026-03-08T18:50:19.924Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-your-ai-coding-assistant-becomes-an-exfiltration-tool</loc><lastmod>2026-03-08T18:48:19.261Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-will-fix-your-vulnerabilities-automatically-five-myths-from-the-darpa-challenge</loc><lastmod>2026-03-08T18:46:28.208Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/70-of-critical-vulns-come-from-memory-issues-here-s-what-one-team-actually-did</loc><lastmod>2026-03-08T18:44:20.520Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/should-you-block-ai-automation-frameworks-before-they-re-weaponized</loc><lastmod>2026-03-08T18:42:20.305Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/open-source-contributions-return-2-5x-investment-while-passive-consumption-bleeds-670k-annually</loc><lastmod>2026-03-08T18:40:20.232Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/implementing-non-human-identity-management-for-ai-systems</loc><lastmod>2026-03-08T18:38:20.567Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/a-financial-services-team-discovers-their-load-balancer-is-the-weakest-link</loc><lastmod>2026-03-08T18:36:21.642Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/machine-identities-now-outnumber-human-users-10-1-in-production</loc><lastmod>2026-03-08T18:34:23.902Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/open-source-security-collaboration-the-mistakes-that-keep-your-team-isolated</loc><lastmod>2026-03-08T18:32:21.934Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/malicious-packages-downloaded-54-500-times-your-dependency-vetting-protocol</loc><lastmod>2026-03-08T18:30:20.448Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/your-non-human-identity-crisis-isn-t-what-you-think-it-is</loc><lastmod>2026-03-08T18:28:21.281Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-just-patched-openssl-what-this-means-for-your-vulnerability-management-program</loc><lastmod>2026-03-08T18:26:43.384Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/oauth-error-flow-attacks-hit-government-networks-a-technical-breakdown</loc><lastmod>2026-03-08T18:26:31.468Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/your-ai-agent-security-checklist-before-the-next-clawjacked</loc><lastmod>2026-03-08T17:34:20.654Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/asvs-5-0-review-checklist-what-to-test-before-the-standard-ships</loc><lastmod>2026-03-08T17:33:33.483Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/4-000-downloads-in-eight-hours-anatomy-of-the-cline-cli-supply-chain-attack</loc><lastmod>2026-03-08T17:33:24.466Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/87-of-production-services-run-exploitable-dependencies</loc><lastmod>2026-03-08T17:32:59.113Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/oauth-credentials-stored-as-executable-html-the-n8n-xss-incident</loc><lastmod>2026-03-08T17:32:47.852Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/a-threat-intelligence-program-that-couldn-t-detect-threats</loc><lastmod>2026-03-06T07:53:01.774Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-enhanced-supply-chain-malware-detection-and-defense-reference</loc><lastmod>2026-03-06T07:53:01.769Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/critical-openclaw-vulnerability-exposes-the-gap-between-ai-tool-adoption-and-security-readiness</loc><lastmod>2026-03-06T07:53:01.764Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/open-source-security-five-myths-blocking-your-supply-chain-defense</loc><lastmod>2026-03-06T07:53:01.762Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/claude-code-vulnerabilities-what-security-teams-need-to-know-right-now</loc><lastmod>2026-03-06T07:53:01.759Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/2-863-google-cloud-keys-became-auth-tokens-without-warning</loc><lastmod>2026-03-06T07:53:01.747Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/api-key-security-audit-preventing-unauthorized-ai-access</loc><lastmod>2026-03-06T07:53:01.740Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/protecting-model-updates-in-federated-learning-your-input-privacy-checklist</loc><lastmod>2026-03-05T12:15:37.986Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/react-native-security-reference-owasp-mas-implementation-for-cross-platform-apps</loc><lastmod>2026-03-05T12:15:33.459Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/iam-for-ai-agents-a-step-by-step-implementation-guide</loc><lastmod>2026-03-05T12:15:32.944Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/preparing-your-kafka-infrastructure-for-agent-communication-and-real-time-anomaly-detection</loc><lastmod>2026-03-05T12:15:32.318Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/your-ai-coding-agent-isn-t-slow-because-it-s-dumb</loc><lastmod>2026-03-05T11:16:20.347Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/five-myths-about-securing-ai-agents-that-will-get-you-breached</loc><lastmod>2026-03-05T11:12:52.112Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/api-keys-outnumber-employees-10-to-1-what-a-financial-services-team-learned-about-machine-identity-sprawl</loc><lastmod>2026-03-05T11:12:51.528Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-agents-won-t-break-your-security-but-these-five-myths-will</loc><lastmod>2026-03-05T11:12:49.659Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/should-you-let-ai-scan-the-code-ai-wrote</loc><lastmod>2026-03-05T11:12:49.211Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-code-generators-don-t-write-insecure-code-and-other-dangerous-myths</loc><lastmod>2026-03-05T11:12:48.331Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/82-of-organizations-can-t-name-their-ai-assets</loc><lastmod>2026-03-05T11:12:47.851Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/should-you-build-iam-on-open-source-or-buy-a-vendor-solution</loc><lastmod>2026-03-05T11:12:46.520Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/sail-framework-implementation-what-6-months-of-adoption-data-reveals</loc><lastmod>2026-03-05T11:12:46.062Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/federated-vulnerability-intelligence-what-your-team-needs-to-know</loc><lastmod>2026-03-05T11:12:45.577Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/owasp-s-lifecycle-standard-faces-the-eu-cyber-resilience-act</loc><lastmod>2026-03-05T11:12:33.553Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-your-help-desk-becomes-your-attack-vector</loc><lastmod>2026-03-05T11:12:23.271Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-ai-agents-outpaced-every-human-researcher-combined</loc><lastmod>2026-03-05T07:53:02.311Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/package-managers-just-held-their-first-cross-ecosystem-security-summit-here-s-what-changed</loc><lastmod>2026-03-05T07:53:02.308Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/malicious-next-js-repos-triggered-backdoors-in-vs-code</loc><lastmod>2026-03-05T07:53:02.305Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/global-software-regulation-just-shifted-from-voluntary-to-mandatory</loc><lastmod>2026-03-05T07:53:02.302Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/a-calendar-invite-hijacked-an-ai-browser-the-perplexedcomet-breakdown</loc><lastmod>2026-03-05T07:53:02.300Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/clawjacked-how-a-browser-tab-hijacked-an-ai-platform-through-localhost</loc><lastmod>2026-03-05T07:53:02.296Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/implementing-differential-privacy-in-federated-learning-without-destroying-model-accuracy</loc><lastmod>2026-03-05T07:53:02.294Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-won-t-replace-your-vulnerability-management-process</loc><lastmod>2026-03-05T07:53:02.291Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/3-000-api-keys-found-in-public-code-a-google-cloud-incident-analysis</loc><lastmod>2026-03-05T07:53:02.287Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/nist-s-ai-control-overlay-strategy-what-security-teams-need-now</loc><lastmod>2026-03-05T07:53:02.284Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/cra-compliance-workflow-template-from-requirements-to-remediation</loc><lastmod>2026-03-05T07:53:02.281Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/secure-by-design-fails-when-you-skip-these-six-steps</loc><lastmod>2026-03-05T07:53:02.278Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/securing-ai-augmented-development-a-reference-guide-for-the-2025-owasp-top-10</loc><lastmod>2026-03-05T07:53:02.274Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/federal-software-supply-chain-security-what-your-auditors-get-wrong</loc><lastmod>2026-03-05T07:53:02.271Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/sbom-validation-script-for-java-projects</loc><lastmod>2026-03-05T07:53:02.268Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-entity-alignment-breaks-your-privacy-budget</loc><lastmod>2026-03-05T07:53:02.264Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-speed-beats-security-the-openclaw-websocket-vulnerability</loc><lastmod>2026-03-05T07:53:02.261Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/the-openssf-badge-won-t-save-your-project-5-myths-blocking-real-security-progress</loc><lastmod>2026-03-05T07:53:02.250Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/should-you-apply-nist-s-ai-risk-framework-or-stick-with-traditional-controls</loc><lastmod>2026-03-05T07:53:02.248Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-generated-code-verification-a-reference-framework-for-security-teams</loc><lastmod>2026-03-05T07:53:02.245Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/llms-can-t-remember-what-you-told-them-yesterday</loc><lastmod>2026-03-05T07:53:02.239Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/red-hat-rewrites-the-eu-cyber-resilience-act-before-it-ships</loc><lastmod>2026-03-05T07:53:02.233Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/19-malicious-npm-packages-stole-credentials-through-ci-cd-pipelines</loc><lastmod>2026-03-05T00:51:04.275Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/compromised-npm-package-installed-openclaw-on-90-000-weekly-downloads</loc><lastmod>2026-03-05T00:50:51.721Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/the-ai-security-engineer-role-what-it-covers-and-what-you-need-to-know</loc><lastmod>2026-03-05T00:50:47.482Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/how-one-python-security-integration-became-the-test-case-for-ai-era-compliance</loc><lastmod>2026-03-05T00:50:42.386Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/implementing-oauth-2-0-authorization-code-flow-a-start-to-finish-playbook</loc><lastmod>2026-03-05T00:50:38.196Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/the-api-key-that-gave-away-the-store-an-llm-endpoint-breach-teardown</loc><lastmod>2026-03-05T00:50:28.924Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/an-ai-bot-published-a-malicious-npm-package-for-eight-hours</loc><lastmod>2026-03-05T00:50:23.302Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/the-calendar-invitation-that-hijacked-an-ai-agent</loc><lastmod>2026-03-05T00:50:17.969Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/burp-ai-prompt-template-for-faster-vulnerability-validation</loc><lastmod>2026-03-05T00:50:14.181Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/the-sast-customization-myths-blocking-your-ai-era-security-program</loc><lastmod>2026-03-05T00:50:09.031Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/platform-engineering-s-supply-chain-security-playbook</loc><lastmod>2026-03-05T00:50:05.439Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/should-you-rely-on-your-scanner-to-catch-the-next-critical-framework-bug</loc><lastmod>2026-03-05T00:50:03.513Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/how-log4j-breaches-still-happen-three-years-later</loc><lastmod>2026-03-05T00:50:01.225Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/reachability-first-security-policy-template</loc><lastmod>2026-03-05T00:49:59.103Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-generated-code-won-t-fix-itself-five-myths-blocking-your-appsec-program</loc><lastmod>2026-03-05T00:49:57.087Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-static-analysis-flagged-847-vulnerabilities-but-only-3-were-real</loc><lastmod>2026-03-05T00:49:54.561Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/two-sbom-tools-got-funded-here-s-what-that-means-for-your-compliance-program</loc><lastmod>2026-03-05T00:49:52.115Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/security-review-checklist-integrating-llms-into-your-vulnerability-detection-workflow</loc><lastmod>2026-03-05T00:49:49.334Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/embedding-security-remediation-in-your-ide-a-cost-reduction-implementation-guide</loc><lastmod>2026-03-05T00:49:45.906Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/the-visibility-gap-what-happens-when-half-your-team-can-t-track-ai-generated-code</loc><lastmod>2026-03-05T00:49:37.149Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/when-vulnerability-scanning-and-patch-deployment-don-t-talk-to-each-other</loc><lastmod>2026-03-05T00:49:34.840Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/building-your-ai-governance-function-a-90-day-implementation-plan</loc><lastmod>2026-03-05T00:49:33.462Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/how-a-vault-license-change-exposed-a-secrets-management-crisis</loc><lastmod>2026-03-05T00:49:31.888Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/a-security-team-deployed-an-llm-assistant-and-exposed-their-vulnerability-database</loc><lastmod>2026-03-04T22:33:14.722Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/security-policy-automation-doesn-t-work-the-way-you-think</loc><lastmod>2026-03-04T22:33:10.338Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-writes-your-code-who-manages-its-secrets</loc><lastmod>2026-03-04T22:33:09.447Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/log4shell-still-haunts-production-builds-three-years-later</loc><lastmod>2026-03-04T22:33:08.049Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/authorization-bypass-exposed-400-endpoints-in-production-api</loc><lastmod>2026-03-04T22:17:04.093Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-code-generators-won-t-fix-your-security-problems</loc><lastmod>2026-03-04T22:17:00.282Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/sixty-kubernetes-clusters-backdoored-through-rbac-misconfiguration</loc><lastmod>2026-03-04T22:16:56.812Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/security-debt-hit-82-of-organizations-last-year-here-s-your-board-deck</loc><lastmod>2026-03-04T22:16:52.567Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/claude-code-vulnerabilities-when-your-ai-assistant-becomes-an-attack-vector</loc><lastmod>2026-03-04T22:16:47.900Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/multi-agent-ai-penetration-testing-what-blacksmithai-s-architecture-reveals-about-automated-security-assessments</loc><lastmod>2026-03-04T22:16:45.429Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/blog/ai-vulnerability-scanning-tools-need-human-verification-here-s-your-checklist</loc><lastmod>2026-03-04T22:16:41.592Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors</loc></url>
  <url><loc>https://appsecuritystandards.org/vendors/apisec</loc><lastmod>2026-04-04T13:59:52.694Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/advanced-installer</loc><lastmod>2026-03-30T20:49:03.469Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/akeyless-security</loc><lastmod>2026-04-06T15:03:37.521Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/armur</loc><lastmod>2026-04-04T19:43:28.663Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/42crunch</loc><lastmod>2026-04-08T15:24:41.920Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/ambisure-technologies-pvt-ltd-let-s-secure-it</loc><lastmod>2026-03-30T19:09:19.996Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/akto-io</loc><lastmod>2026-04-08T14:01:17.136Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/arnica</loc><lastmod>2026-02-17T22:37:48.833Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/qodo</loc><lastmod>2026-02-17T22:38:09.886Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/socket</loc><lastmod>2026-02-17T22:38:15.189Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/wallarm-api-security-leader</loc><lastmod>2026-02-17T22:37:34.830Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/cygnostic</loc><lastmod>2026-02-26T14:04:47.444Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/digital-ai</loc><lastmod>2026-02-17T22:37:39.360Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/postman</loc><lastmod>2026-02-17T22:37:32.345Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/snyk</loc><lastmod>2026-02-17T22:38:14.865Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/entro-security</loc><lastmod>2026-02-17T22:38:31.340Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/chainloop</loc><lastmod>2026-02-17T22:37:16.424Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/fluid-attacks</loc><lastmod>2026-02-17T22:38:00.758Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/plexicus-ai-powered-cnapp</loc><lastmod>2026-02-17T22:38:08.800Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/nodesource</loc><lastmod>2026-02-17T22:37:24.865Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/netrise</loc><lastmod>2026-02-17T22:37:24.243Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/appdome</loc><lastmod>2026-02-17T22:37:09.663Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/data-theorem-inc</loc><lastmod>2026-02-17T22:37:58.034Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/promon</loc><lastmod>2026-02-17T22:37:32.877Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/timesys-is-now-lynx</loc><lastmod>2026-02-17T22:37:27.626Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/oligo-security</loc><lastmod>2026-02-17T22:38:06.645Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/cycode</loc><lastmod>2026-02-17T22:37:57.504Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/hoop-dev</loc><lastmod>2026-02-17T22:37:19.072Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/stackhawk</loc><lastmod>2026-02-17T22:37:44.650Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/ox-security</loc><lastmod>2026-02-17T22:38:07.614Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/soos</loc><lastmod>2026-02-17T22:38:16.735Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/mend-io</loc><lastmod>2026-02-17T22:38:26.800Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/zeropath</loc><lastmod>2026-02-17T22:38:24.105Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/appknox</loc><lastmod>2026-02-17T22:37:36.861Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/pt-intersoft-integrasi-infotama-i3</loc><lastmod>2026-02-17T22:37:40.426Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/mayhem</loc><lastmod>2026-02-17T22:38:04.895Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/fossa</loc><lastmod>2026-02-17T22:38:25.538Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/purevpn-partner-enterprise-solutions</loc><lastmod>2026-02-17T22:38:37.062Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/tromzo</loc><lastmod>2026-02-17T22:37:09.168Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/kodem</loc><lastmod>2026-02-17T22:38:04.319Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/softseq</loc><lastmod>2026-02-17T22:38:15.721Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/sonatype</loc><lastmod>2026-02-17T22:37:27.000Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/accessibility-com</loc><lastmod>2026-04-20T13:16:25.496Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/bright</loc><lastmod>2026-02-17T22:37:37.854Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/bito</loc><lastmod>2026-02-17T22:37:49.612Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/n-stalker-acquired-by-conviso</loc><lastmod>2026-02-17T22:37:05.999Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/ennote</loc><lastmod>2026-02-17T22:38:30.739Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/iriusrisk</loc><lastmod>2026-02-17T22:37:07.358Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/codiga</loc><lastmod>2026-02-17T22:37:55.376Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/phase</loc><lastmod>2026-02-17T22:38:36.035Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/codesecure-inc</loc><lastmod>2026-02-17T22:37:54.850Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/cloud-destinations</loc><lastmod>2026-02-17T22:37:52.465Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/contrast-security</loc><lastmod>2026-02-17T22:37:55.904Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/dscifer</loc><lastmod>2026-02-17T22:38:00.206Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/waratek</loc><lastmod>2026-02-17T22:38:22.161Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/cybeats</loc><lastmod>2026-02-17T22:37:17.471Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/integrated-computer-solutions-inc-ics</loc><lastmod>2026-02-17T22:37:19.792Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/onboardbase-techstars-23</loc><lastmod>2026-02-17T22:38:34.168Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/devtools</loc><lastmod>2026-02-17T22:37:59.659Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/black-duck</loc><lastmod>2026-02-17T22:37:50.108Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/semgrep</loc><lastmod>2026-02-17T22:38:14.317Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/passbolt</loc><lastmod>2026-02-17T22:38:34.691Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/dersecur</loc><lastmod>2026-02-17T22:37:59.054Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/crowdstrike</loc><lastmod>2026-02-17T22:37:06.602Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/costrategix</loc><lastmod>2026-02-17T22:37:56.953Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/sparrow-co-ltd</loc><lastmod>2026-02-17T22:37:44.070Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/quali</loc><lastmod>2026-02-17T22:37:13.939Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/vault</loc><lastmod>2026-02-17T22:38:37.701Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/armorcode-inc-2</loc><lastmod>2026-02-17T22:37:04.853Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/levo-ai</loc><lastmod>2026-02-17T22:37:42.140Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/tola-capital</loc><lastmod>2026-02-17T22:38:19.445Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/qa-camp</loc><lastmod>2026-02-17T22:38:09.304Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/exclusive-networks</loc><lastmod>2026-02-17T22:38:31.981Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/istrosec</loc><lastmod>2026-02-17T22:38:03.311Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/scribe-security-e2e-software-supply-chain-security</loc><lastmod>2026-02-17T22:37:26.463Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/terrateam</loc><lastmod>2026-02-17T22:37:15.107Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/true-positives</loc><lastmod>2026-02-17T22:37:45.671Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/passwork-self-hosted-password-manager-for-your-business</loc><lastmod>2026-02-17T22:38:35.231Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/finite-state</loc><lastmod>2026-02-17T22:37:18.500Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/pulumi</loc><lastmod>2026-02-17T22:38:36.566Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/nimbusstack</loc><lastmod>2026-02-17T22:37:13.238Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/armourzero</loc><lastmod>2026-02-17T22:37:47.597Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/kiuwan</loc><lastmod>2026-02-17T22:38:03.800Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/xygeni</loc><lastmod>2026-02-17T22:38:23.648Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/triotech-systems</loc><lastmod>2026-02-17T22:38:21.093Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/dark-sky-technology-inc</loc><lastmod>2026-02-17T22:38:24.867Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/sonar</loc><lastmod>2026-02-17T22:38:16.212Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/bitwarden</loc><lastmod>2026-02-17T22:38:28.387Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/qwiet-ai-by-harness</loc><lastmod>2026-02-17T22:38:10.593Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/cloudtechner</loc><lastmod>2026-02-17T22:37:10.742Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/scanoss</loc><lastmod>2026-02-17T22:37:25.808Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/ldra-limited</loc><lastmod>2026-02-17T22:37:41.634Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/escape</loc><lastmod>2026-02-17T22:37:39.924Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/spacelift</loc><lastmod>2026-02-17T22:37:14.517Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/outpost-qa</loc><lastmod>2026-02-17T22:37:43.349Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/doppler</loc><lastmod>2026-02-17T22:38:29.493Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/cequence-security</loc><lastmod>2026-02-17T22:37:30.930Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/ketryx</loc><lastmod>2026-02-17T22:37:21.488Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/manifest</loc><lastmod>2026-02-17T22:37:23.111Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/toradex</loc><lastmod>2026-02-17T22:37:28.203Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/infisical</loc><lastmod>2026-02-17T22:38:32.545Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/jfrog</loc><lastmod>2026-02-17T22:37:20.955Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/circleci</loc><lastmod>2026-02-17T22:37:10.189Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/secure-decisions</loc><lastmod>2026-02-17T22:38:13.812Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/solo-io</loc><lastmod>2026-02-17T22:38:37.512Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/codeant-ai</loc><lastmod>2026-02-17T22:37:54.327Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/inedo</loc><lastmod>2026-02-17T22:37:20.324Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/onekey</loc><lastmod>2026-02-17T22:37:25.361Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/syhunt</loc><lastmod>2026-02-17T22:37:45.180Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/apiiro</loc><lastmod>2026-02-17T22:37:04.248Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/bug-zero</loc><lastmod>2026-02-17T22:37:50.631Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/orasi-software</loc><lastmod>2026-02-17T22:38:07.149Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/mergebase</loc><lastmod>2026-02-17T22:38:27.306Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/appcheck-ltd</loc><lastmod>2026-02-17T22:37:36.356Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/firetail-ai</loc><lastmod>2026-02-17T22:37:31.755Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/checkmarx</loc><lastmod>2026-02-17T22:37:51.127Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/portswigger</loc><lastmod>2026-02-17T22:37:43.880Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/harness</loc><lastmod>2026-02-17T22:37:12.564Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/mass-data-defense-corporation-2</loc><lastmod>2026-02-17T22:38:33.471Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/black-hat</loc><lastmod>2026-02-17T22:37:37.342Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/lineaje-inc</loc><lastmod>2026-02-17T22:37:22.506Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/medcrypt</loc><lastmod>2026-02-17T22:37:23.740Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/aptori</loc><lastmod>2026-02-17T22:37:47.142Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/guardrails</loc><lastmod>2026-02-17T22:38:01.904Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/copia-automation</loc><lastmod>2026-02-17T22:37:11.339Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/scantist</loc><lastmod>2026-02-17T22:38:12.676Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/code-intelligence</loc><lastmod>2026-02-17T22:37:53.733Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/pynt</loc><lastmod>2026-02-17T22:37:34.205Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/amyris</loc><lastmod>2026-02-17T22:37:46.498Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/scandog</loc><lastmod>2026-02-17T22:38:12.113Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/ostorlab</loc><lastmod>2026-02-17T22:37:42.707Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/peris-ai-cybersecurity</loc><lastmod>2026-02-17T22:38:08.110Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/macnica-2</loc><lastmod>2026-02-17T22:38:33.034Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/merito</loc><lastmod>2026-02-17T22:38:05.438Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/veracode</loc><lastmod>2026-02-17T22:38:21.624Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/threatrix</loc><lastmod>2026-02-17T22:38:18.792Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/cqse-gmbh</loc><lastmod>2026-02-17T22:38:18.063Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/clouddefense-ai</loc><lastmod>2026-02-17T22:37:51.739Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/deepsource</loc><lastmod>2026-02-17T22:37:58.551Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/wind-river</loc><lastmod>2026-02-17T22:37:28.707Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/codacy</loc><lastmod>2026-02-17T22:37:53.109Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/riversafe</loc><lastmod>2026-02-17T22:38:11.617Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/elven</loc><lastmod>2026-02-17T22:38:30.155Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/we45</loc><lastmod>2026-02-17T22:38:22.604Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/corgea</loc><lastmod>2026-02-17T22:37:56.377Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/prophaze</loc><lastmod>2026-02-17T22:37:33.408Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/legit-security</loc><lastmod>2026-02-17T22:37:07.927Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/secure-code-warrior</loc><lastmod>2026-02-17T22:38:13.308Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/eracent</loc><lastmod>2026-02-17T22:37:17.991Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/codific</loc><lastmod>2026-02-17T22:37:05.439Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/devtron-inc</loc><lastmod>2026-02-17T22:37:12.063Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/security-compass</loc><lastmod>2026-02-17T22:37:08.487Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/wolfssl</loc><lastmod>2026-02-17T22:38:23.107Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/spectralops-io-a-check-point-solution</loc><lastmod>2026-02-17T22:38:17.510Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/cloudsmith</loc><lastmod>2026-02-17T22:37:16.987Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/grammatech</loc><lastmod>2026-02-17T22:38:01.285Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/trail-of-bits</loc><lastmod>2026-02-17T22:38:20.580Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/fossid</loc><lastmod>2026-02-17T22:38:26.211Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/kusari</loc><lastmod>2026-02-17T22:37:21.995Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/traceable-by-harness</loc><lastmod>2026-02-17T22:38:19.994Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/rainforest-technologies</loc><lastmod>2026-02-17T22:38:10.939Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/gitguardian</loc><lastmod>2026-02-17T22:37:29.223Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/nova8</loc><lastmod>2026-02-17T22:38:06.133Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/guardsquare</loc><lastmod>2026-02-17T22:38:02.678Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/invicti</loc><lastmod>2026-02-17T22:37:41.166Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/vendors/cloudflare</loc><lastmod>2026-02-17T22:38:28.973Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/pages/about</loc><lastmod>2026-05-02T19:00:26.603Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/pages/submit-vendor</loc><lastmod>2026-04-29T18:08:12.213Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/pages/contact</loc><lastmod>2026-04-29T17:41:00.362Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/resources/what-is-application-security</loc><lastmod>2026-04-28T18:13:28.400Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/resources/the-state-of-application-security-in-modern-software</loc><lastmod>2026-04-28T16:12:04.237Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/pages/terms-and-conditions</loc><lastmod>2026-03-30T12:01:31.391Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/pages/privacy</loc><lastmod>2026-03-09T14:36:02.308Z</lastmod></url>
  <url><loc>https://appsecuritystandards.org/webinars</loc></url>
  <url><loc>https://appsecuritystandards.org/tools</loc></url>
</urlset>