<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://mindgard.ai</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/about</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/learn/resources</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/contact-us</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/ai-security-platform</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/demo</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/learn/blog</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/events</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/careers</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/terms-and-conditions</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/privacy-policy</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/services/ai-red-teaming-pentesting</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/ai-artifact-scanning</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/demo-success</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/contact-us-success</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/events/infosec-2025</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/events/black-hat-usa-2025</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/compare/mindgard-vs-protect-ai</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/compare/list</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/legal</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/services/technical-account-manager</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/compare/mindgard-vs-robust-intelligence</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/services/ai-security-expert</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/services/mindgard-services</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/compare/mindgard-vs-prompt-security</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/compare/mindgard-vs-lakera</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/compare/mindgard-vs-calypsoai</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/compare/mindgard-vs-splx</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/learn/disclosures</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/ai-discovery-assessment</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/automated-ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/learn/customers</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/legal/sub-processors</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/events/rsa-2026</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/ai-recon-discovery</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/legal/security-overview</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/offensive-ai-security</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/ai-governance-compliance</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/ai-runtime-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/legal/data-protection-addendum</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/legal/master-services-agreement</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/legal/coordinated-vulnerability-disclosure-policy</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/academy</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/legal/end-user-license-agreement</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/ai-red-teaming-for-image-models</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/analyst-report-gartner-ai-trism-market-guide</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/bringing-ai-security-into-your-ci-cd-with-mindgard</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/bypassing-llm-guardrails-character-and-aml-attacks-in-practice</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/compilation-as-a-defense-enhancing-dl-model-attack-robustness-via-tensor-optimization</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/compilation-as-defense-using-tensor-optimizations-to-confuse-attackers</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/hunting-ai-application-vulnerabilities-with-burp</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/introducing-mindgard-mitre-atlas-tm-adviser</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/mindgard-recognized-as-uks-most-innovative-cyber-sme-2024-at-infosecurity-europe</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/model-leeching-an-extraction-attack-targeting-llms</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/model-leeching-cheaply-cloning-llm-skills-for-attack-staging</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/modern-ai-red-teaming-probabilities-vulnerabilities-and-psychometrics</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/pinch-an-adversarial-extraction-attack-frame-work-for-deep-learning-models</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/pinch-framework-mapping-how-model-stealing-attacks-really-work</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/report-cyber-security-for-ai-recommendations</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/shadow-ai-is-a-blind-spot</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/vibe-check-security-failures-in-ai-assisted-ides</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/webinar-exploiting-blind-spots-within-ai-guardrails</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/resources/webinar-test-ai-systems-not-models</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/ai-security-collective-london-0725</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/black-hat-usa-2025</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/black-hat-usa-2026</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/camlis-2025</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/cyber-uk-2025</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/data-science-summit</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/eai-securecomm-2026</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/infosecurity-europe</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/infosecurity-europe-2</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/kubecon-north-america-2025</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/llmsec-2025</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/london-tech-week-ai-summit</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/nvidia-gtc</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/offensive-ai-con-2025</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/owasp-gen-ai-application-security-risk-summit</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/rsa-conference</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/tech-eu-summit-london</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/ucl-ml-symposium</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/un-prompted</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/event/webinar-ai-security-is-greater-than-model-testing---its-an-appsec-problem</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/2026-gartner-emerging-tech-top-funded-startups-in-ai-trism-agentic-ai-and-beyond</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/agentic-ai-security-templates</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/agentic-ai-strategies-for-risk-management</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-application-security-steps</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-code-security</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-data-security-statistics</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-data-security-templates</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-governance-templates</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-model-risk-management</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-penetration-testing-biggest-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-red-teaming-statistics</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-red-teaming-templates</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-risk-management-checklist</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-risk-mitigation-strategies</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-security-as-an-appsec-problem</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-security-best-practices</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-security-templates</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-security-training-courses-and-resources</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-thinks-impossible-hold-wooden-ruler-one-hand</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-threat-hunting</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-threat-intelligence-emerging-threats-facing-ai-agents</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-threat-modeling-strategies-for-multi-agent-ai-systems</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-under-attack-six-key-adversarial-attacks-and-their-consequences</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-vulnerability-database</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-vulnerability-management-best-practices</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ai-vulnerability-scanner-metrics</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/approve-once-exploit-forever-the-trust-persistence-problem-in-ai-coding-agents</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/audio-based-jailbreak-attacks-on-multi-modal-llms</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/best-ai-risk-management-certifications</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/best-ai-security-companies</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/best-ai-security-tools-for-llm-and-genai</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/best-cybersecurity-startup-best-ai-security-solution-cybersecurity-excellence-awards</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/best-offensive-security-certifications-and-training-courses</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/best-offensive-security-tools</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/best-tools-for-red-teaming</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/breach-and-attack-simulation-vs-red-teaming</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/bypassing-ai-driven-deepfake-detection-via-evasion-attacks</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/bypassing-azure-ai-content-safety-guardrails</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/bypassing-image-safeguards-in-chatgpt</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/can-my-model-be-hacked-understanding-and-mitigating-security-vulnerabilities-within-llms</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/claude-offers-up-instructions-to-make-explosives</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/comparing-the-ai-strategies-of-the-uk-usa</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/continuous-automated-red-teaming</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/deepseek-r1s-susceptibility-to-exhaustion-attacks</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/doctronic-is-now-accepting-new-patients-and-unsafe-instructions</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/expanding-ai-safety-evaluation-with-adversarial-techniques</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/extracting-sora-system-prompt</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/find-and-mitigate-an-llm-jailbreak</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/gartner-ai-trism-market-guide</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/gartner-hype-cycle-for-application-security-testing</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/genai-data-security</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/generative-ai-security</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/google-antigravity-persistent-code-execution-vulnerability</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/googles-red-team</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/heidi-health-ai-can-show-doctors-how-to-steal-your-identity</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/how-the-owasp-top-10-risks-for-llms-evolved-from-2023-to-2025-lessons-and-implications</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/how-to-conduct-an-ai-risk-assessment</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/how-to-conduct-an-ai-security-assessment</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/how-to-conduct-an-ai-vulnerability-assessment</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/how-to-conduct-effective-prompt-injection-testing</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/how-to-identify-high-risk-ai-systems</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/how-to-measure-a-red-teaming-assessment</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/how-to-prevent-prompt-injection-attacks</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/how-to-safeguard-llms-with-guardrails</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/how-to-secure-ai-chatbots-with-targeted-pentesting</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/how-to-secure-mcp-servers-against-prompt-injection-attacks</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/how-to-secure-my-ai-model</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/indirect-prompt-injection-examples</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/iso-iec-23894-ai-risk-management-standard</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/iso-iec-42001-ai-management-system-standard</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/jailbreak-and-encoding-risks-in-pixtral-large-instruct-2411</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/level-up-your-ai-red-teaming-custom-inputs-repeated-prompts-and-smarter-attacks</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/llm-architecture-positioning</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/mcp-security-statistics-and-benchmarks</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/mcp-security-templates</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/mcp-security-trends</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/microsoft-ai-red-team</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/mindgard-appoints-james-brear-as-ceo</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/mindgard-expands-leadership-aaron-portnoy-tom-axbey</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/mindgard-named-among-uks-most-ground-breaking-new-businesses</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/mindgard-nvidia-gtc-2025-poster-award</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/mindgard-owasp-llm-genai-security-solutions-landscape</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/mindgard-raises-8m-industry-first-ai-security-solution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/mindgard-unveils-first-autonomous-ai-security-platform-to-identify-and-fix-exploitable-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/mit-ai-risk-repository-ai-red-teamers-pen-testers</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/obtaining-google-system-instructions-to-disable-its-safety-constraints</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/offensive-security-service-providers</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/openai-red-teaming-network</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/outsmarting-ai-guardrails-with-invisible-characters-and-adversarial-prompts</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/owasp-ai-security-guidance</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/people-to-know-in-ai-security-and-ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/physical-red-teaming-trends</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/prompt-injection-attacks-in-chatgpt</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/prompt-injection-attacks-in-copilot</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/prompt-injection-attacks-in-deepseek</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/prompt-injection-detection-strategies</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/prompt-injection-in-llms</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/prompt-injection-techniques</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/prompt-injection-vs-jailbreak</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/red-team-attack-simulation</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/red-team-offensive-security</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/red-team-operations-phases-of-engagement</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/red-team-training</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/red-team-vs-blue-team-in-cyber-security</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/red-team-vs-blue-team-vs-purple-team-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/red-team-vs-purple-team-in-cyber-security</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/red-teaming</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/red-teaming-checklist</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/red-teaming-companies</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/red-teaming-examples</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/red-teaming-exercises-processes-examples</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/red-teaming-llms-techniques-and-mitigation-strategies</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/red-teaming-vs-pentesting</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/secure-llms-against-prompt-injections</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/techniques-used-in-red-teaming</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/ten-of-ten-ai-chatbots-give-school-shooting-planning-advice</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/the-missing-first-step-in-ai-security-testing-reconnaissance</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/the-riddles-chatgpt-5-2-cant-solve-without-chain-of-babble</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/thelibrarian-ios-ai-security-disclosure</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/top-ai-pentesting-tools</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/top-ai-security-risks</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/top-pentesting-service-providers</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/understanding-lumo-ai-assistant-announcing-pylumo</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/using-ai-for-offensive-security-operations</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/welcoming-jim-nightingale-to-mindgard</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/what-are-ai-guardrails</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/what-is-a-prompt-injection-attack</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/what-is-ai-data-security</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/what-is-ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/what-is-ai-risk-management</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/what-is-ai-security</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/what-is-ai-security-posture-management</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/what-is-offensive-security</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/when-configuration-becomes-code-the-hidden-execution-layer-in-ai-development-tools</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/why-did-grok-generate-bomb-recipes</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/blog/zed-ide-vulnerabilities-coordinated-disclosure</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/authors/aaron-portnoy</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/authors/alex-dutton</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/authors/fergal-glynn</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/authors/jim-nightingale</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/authors/lewis-birch</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/authors/peter-garraghan</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/authors/piotr-ryciak</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/authors/rich-smith</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/authors/stefan-trawicki</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/authors/william-hackett</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/aider-coding-assistant-configuration-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/amazon-kiro-ide-data-exfiltration-via-filename-prompt-injection-and-kiro-powers-registry-fetching</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/amazon-kiro-ide-data-exfiltration-via-steering-file</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/anthropic-claude-code-code-execution-via-toctou-config-poisoning-trust-persistence</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/claude-code-configuration-poisoning-remote-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/cline-bot-ai-coding-agent-code-execution-via-prompt-injection-and-clinerules-directives</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/cline-bot-ai-coding-agent-code-execution-via-prompt-injection-and-toctou-script-invocation</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/cline-bot-ai-coding-agent-data-exfiltration-via-prompt-injection-and-dns</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/cursor-ide-binary-planting-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/eclipse-theia-ide-code-execution-via-adversarial-directory-and-via-tasks-json-definition</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/eclipse-theia-ide-code-execution-via-template-file-and-tasks-json-definition</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/eclipse-theia-ide-data-exfiltration-via-adversarial-directory-and-markdown-images</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/eclipse-theia-ide-data-exfiltration-via-template-file-and-markdown-images</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/eclipse-theia-ide-mcp-configuration-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/factory-ai-coding-assistant-git-pager-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/factory-ai-coding-assistant-mcp-configuration-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/factory-ai-git-diff-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/gemini-cli-code-execution-via-toctou-trust-persistence</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/google-antigravity-ide---persistent-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/google-gemini-cli-mcp-configuration-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/google-gemini-cli-tool-discovery-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/jetbrains-junie-ai-coding-agent-guidelines-md-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/joblib-model-file-path-traversal-via-ndarraywrapper-zndarraywrapper-in-compat-format</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/joblib-model-file-pickle-restriction-bypass-via-hidden-payload-in-array-data</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/joblib-model-file-scanner-bypass-via-compressed-files</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/kilo-ai-cli-coding-assistant-shell-command-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/meta-prompt-guard-guardrail-evasion</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/microsoft-azure-ai-content-safety-guardrail-evasion</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/microsoft-azure-prompt-shield-guardrail-evasion</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/microsoft-onnx-runtime-code-execution-via-tile-operator-heap-buffer-overflow</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/mistral-vibe-cli-mcp-configuration-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/mistral-vibe-cli-mcp-configuration-code-execution-2</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/mistral-vibe-cli-python-tools-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/mistral-vibe-cli-shell-expansion-command-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-nemoguard-jailbreak-detect-guardrail-evasion</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-tensorrt-arbitrary-code-execution-via-embedded-plugin-dlopen</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-tensorrt-llm-missing-hmac-key-in-trtllm-serve-disaggregated-launch-path</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-tensorrt-llm-nixl-rdma-write-to-attacker-controlled-gpu-addresses-via-notification-memorydesc</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-tensorrt-llm-triton-backend-context-phase-params-deserialization-enables-ssrf-rdma-injection</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-tensorrt-llm-unauthenticated-disagg-cluster-storage-enables-fake-worker-registration---request-hijacking</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-tensorrt-llm-unauthenticated-disaggregated-opaque-state-deserialization-ssrf-kv-cache-data-injection</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-tensorrt-unbounded-nbdims-in-tensor-shape-deserialization-stack-buffer-overflow</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-tensorrt-unchecked-shader-index-in-readenginefromarchive-heap-oob-read</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-triton-inference-http-request-smuggling-via-cl-te</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-triton-inference-server-code-execution-via-trace-file-content-injection</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-triton-inference-server-cross-site-scripting-via-request-id-reflection</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-triton-inference-server-dos-via-arbitrary-posix-shm-access-and-unregister-all</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-triton-inference-server-dos-via-gzip-decompression-amplification</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-triton-inference-server-dos-via-zero-dimension-shape</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-triton-inference-server-http-request-smuggling-via-te-obfuscation-variants</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-triton-inference-server-log-forgery-via-log-file-content-injection</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/nvidia-triton-inference-server-waf-bypass-via-content-type-header-ignored</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/openai-chatgpt-content-safety-explicit-image-bypass</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/openai-codex-cli-configuration-poisoning-remote-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/openai-codex-cli-git-diff-code-execution-and-sandbox-escape</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/openai-codex-cli-mcp-configuration-remote-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/openai-codex-cli-model-provider-configuration-remote-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/openai-codex-cli-notify-field-configuration-remote-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/openai-codex-code-execution-via-toctou-trust-persistence</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/protect-ai-jailbreak-and-prompt-injection-guardrail-evasion</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/ray-serve-code-execution-via-replica-grpc-pickle-deserialization</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/ray-serve-cross-site-scripting-via-x-request-id-response-header-reflection</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/ray-serve-http-proxy-header-injection-via-crlf</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/ray-serve-internal-http-header-forging</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/ray-serve-ip-spoofing-via-crlf-injected-trust-headers</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/thelibrarian-io-internal-cloud-environment-access-via-web-fetch-tool</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/trae-ide-openpreview-data-exfiltration</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/vijil-prompt-injection-guardrail-evasion</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/zed-ide-lsp-configuration-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/disclosures/zed-ide-mcp-configuration-code-execution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/customers/applying-an-attackers-mindset-to-secure-ai-systems-in-a-global-development-and-financial-institution</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/customers/demonstrating-real-ai-security-impact-in-a-global-semiconductor-manufacturing-enterprise</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/customers/protecting-enterprise-ai-systems-with-continuous-attacker-aligned-testing</loc>
    </url>
    <url>
        <loc>https://mindgard.ai/customers/securing-mission-critical-ai-applications-in-a-global-highly-regulated-enterprise</loc>
    </url>
</urlset>