<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
<url><loc>https://labs.snyk.io/resources/OAuth-mistake-takeover-part-one/</loc><lastmod>2026-03-27T07:37:57.227Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/OAuth-mistake-takeover-part-two/</loc><lastmod>2026-03-26T18:38:35.264Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/exploiting-diagram-renderers/</loc><lastmod>2026-03-06T18:33:06.945Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/bypass-openclaw-security-sandbox/</loc><lastmod>2026-02-26T17:19:57.432Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/agent-scan-skill-inspector/</loc><lastmod>2026-02-13T15:17:05.278Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/maestro-threat-modeling/</loc><lastmod>2026-02-10T15:48:21.914Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/threat-modeling-best-defense/</loc><lastmod>2026-02-10T15:36:19.585Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/toxic-flow-analysis/</loc><lastmod>2026-02-10T12:06:41.671Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/detect-tool-poisoning-mcp-server-security/</loc><lastmod>2026-02-10T12:05:27.335Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/incus-vulnerabilities-newline-symlink-arbitrary-writes/</loc><lastmod>2026-01-29T10:01:37.350Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/applying-CSA-guide-autonomous-agents/</loc><lastmod>2026-01-28T09:23:12.726Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/future-aispm/</loc><lastmod>2025-11-13T15:26:36.127Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/shadow-ai-cost/</loc><lastmod>2025-11-13T13:22:49.758Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/guardrails-agentic-ai-mcp-aibom/</loc><lastmod>2025-11-05T17:24:43.705Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/continuous-offensive-testing-ai-systems/</loc><lastmod>2025-11-04T15:15:07.562Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/resources/agentic-orchestration-ai-security/</loc><lastmod>2025-10-28T19:48:24.738Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/evo-by-snyk/</loc><lastmod>2025-10-22T11:56:15.174Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/the-case-for-AISPM/</loc><lastmod>2025-09-09T16:08:30.947Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/cursor-jira-mcp-vulnerability-explained/</loc><lastmod>2025-08-20T14:33:17.058Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/ragpoison-prompt-injection/</loc><lastmod>2025-08-18T12:28:43.374Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/aibom-cli-snyk/</loc><lastmod>2025-08-05T13:30:47.663Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/prompt-injection-mcp/</loc><lastmod>2025-08-04T17:05:27.189Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/snyk-aibom-scanner/</loc><lastmod>2025-08-04T12:08:36.169Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/mcps-snyk-ai-bom/</loc><lastmod>2025-08-04T12:00:10.108Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/nixos-deep-dive/</loc><lastmod>2025-07-15T13:25:38.340Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/snyk-labs-invariant-labs/</loc><lastmod>2025-06-24T13:09:41.803Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/security-genai-code-llm-integrations/</loc><lastmod>2025-05-28T13:45:49.030Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/malware-in-llm-python-package-supply-chains/</loc><lastmod>2025-05-28T12:45:18.297Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/cve-2024-21626-runc-process-cwd-container-breakout/</loc><lastmod>2025-05-27T22:10:02.710Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/leaky-vessels-docker-runc-container-breakout-vulnerabilities/</loc><lastmod>2025-05-27T22:09:54.817Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/leaky-vessels-container-vuln-deep-dive/</loc><lastmod>2025-05-27T22:09:45.909Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/abusing-ubuntu-root-privilege-escalation/</loc><lastmod>2025-05-27T22:09:38.066Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/exploring-vulnerabilities-github-actions/</loc><lastmod>2025-05-27T22:09:27.965Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/repo-jacking-the-great-source-code-swindle/</loc><lastmod>2025-05-27T22:09:19.794Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/agent-hijacking/</loc><lastmod>2025-05-27T22:09:10.252Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/proxmox-ve-cve-2024-21545-tricking-the-api/</loc><lastmod>2025-05-27T22:09:02.361Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/chatgpts-new-model-almost-got-me-fired/</loc><lastmod>2025-05-27T22:08:47.757Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/vibe-coding-with-claude-code-claude-agentic-ai-tool/</loc><lastmod>2025-05-27T22:08:40.341Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/can-you-really-pair-program-with-ai-aider-and-cohere/</loc><lastmod>2025-05-27T22:08:26.667Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/github-copilot-xss-react/</loc><lastmod>2025-05-27T22:07:58.429Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/gitflops-dangers-of-terraform-automation-platforms/</loc><lastmod>2025-05-27T22:07:47.410Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/does-claude-3-7-sonnet-generate-insecure-code/</loc><lastmod>2025-05-27T22:07:36.259Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/breaking-caches-bypassing-istio-rbac/</loc><lastmod>2025-05-27T22:07:25.256Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/adversarial-inputs-to-image-classifiers-understanding-the-threat-of/</loc><lastmod>2025-05-27T22:07:10.542Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/socketsleuth-improving-security-testing-for-websocket-applications/</loc><lastmod>2025-05-27T22:06:57.287Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/copilot-amplifies-insecure-codebases-by-replicating-vulnerabilities/</loc><lastmod>2025-05-27T22:06:02.562Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/breaking-down-openssl-vulnerability/</loc><lastmod>2025-05-27T22:05:54.775Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/exploring-android-intent-based-security-vulnerabilities-google-play/</loc><lastmod>2025-05-27T22:04:42.381Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/hunting-intent-based-android-security-vulnerabilities-with-snyk-code/</loc><lastmod>2025-05-27T22:04:30.726Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/mitigating-remediating-intent-based-android-security-vulnerabilities/</loc><lastmod>2025-05-27T22:04:22.424Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/visual-studio-code-extension-security-vulnerabilities-deep-dive/</loc><lastmod>2025-05-27T22:04:14.537Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/pypi-malware-discord-roblox-credential-payment-info/</loc><lastmod>2025-05-27T22:04:06.377Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/pypi-package-imitates-known-developer/</loc><lastmod>2025-05-27T22:03:56.418Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/gitpod-remote-code-execution-vulnerability-websockets/</loc><lastmod>2025-05-27T22:03:49.007Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/cve-2024-23652-buildkit-build-time-container-teardown-arbitrary-delete/</loc><lastmod>2025-05-27T22:03:28.560Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/cve-2024-23651-docker-buildkit-mount-cache-race/</loc><lastmod>2025-05-27T22:03:11.492Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/cve-2024-23653-buildkit-grpc-securitymode-privilege-check/</loc><lastmod>2025-05-27T22:02:57.255Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/remote-code-execution-with-spring-boot-3-4-0-properties/</loc><lastmod>2025-05-27T21:54:22.134Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/hijacking-oauth-flows-via-cookie-tossing/</loc><lastmod>2025-05-27T21:54:22.055Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/hacking-comfyui-through-custom-nodes/</loc><lastmod>2025-05-27T21:54:21.912Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/in-localhost-we-trust-exploring-vulnerabilities-in-cortex-cpp-jans-ai-engine/</loc><lastmod>2025-05-27T21:54:21.790Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/path-traversal-vulnerability-in-deep-java-library-djl-and-its-impact-on-java/</loc><lastmod>2025-05-27T21:53:26.790Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/vulnerabilities-in-deep-learning-file-formats/</loc><lastmod>2025-05-27T21:53:26.737Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/4-hidden-ai-coding-risks-and-how-to-address-them/</loc><lastmod>2025-05-27T21:53:26.658Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/tensor-steganography-and-ai-cybersecurity/</loc><lastmod>2025-05-27T21:53:26.495Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/red-team-your-llm-agents-before-attackers-do/</loc><lastmod>2025-05-27T21:53:26.203Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/snyk-contributes-new-mcp-security-controls-owasp-llmsvs/</loc><lastmod>2025-05-27T21:53:26.145Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/snyk-genai-model-risk-registry/</loc><lastmod>2025-05-27T21:53:26.080Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
<url><loc>https://labs.snyk.io/resources/introducing-snyk-labs/</loc><lastmod>2025-05-27T21:53:25.895Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url>
</urlset>