<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.pillar.security/blog</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/risks</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/about</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/challenge-coin</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/resources/buyer-guide</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/resources/the-state-of-attacks-on-genai</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/request-a-free-ai-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/resources/webinar-ai-security-use-cases-and-challenges-for-2025</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/resources/webinar-ai-security-agentic-use-cases-and-challenges-for-2025-video</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/events/rsac-2025</loc>
    </url>
    <url>
        <loc>https://www.pillar.security</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/get-a-demo</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-security-posture-report</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/sail</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/events/black-hat-2025</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/resources/webinar-building-your-ai-security-roadmap</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/resources/webinar-building-your-ai-security-roadmap-video</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/newsroom</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/partners</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/resigter-a-deal</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/careers</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/resigter-a-deal-gd</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/frost-sullivans-competitive-strategy-leadership-award</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/resigter-a-deal-devoteam</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/agentic-ai-red-teaming-playbook</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-red-teaming-introduction</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-red-team-in-practice</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/redgraph</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/resources/webinar-a-practitioners-guide-to-building-an-ai-inventory</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/resources/webinar-a-practitioners-guide-to-building-an-ai-inventory-video</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/pillar-research</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/resources/operation-bizarre-bazaar</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/events/rsa-2026</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/platform/ai-discovery-posture</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/platform/red-teaming-risk-detection</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/platform/runtime-guardrails</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/platform/governance-compliance</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/resources/threat-report-chaos-agent-hackerbot-claw</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/playground</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/resources/installfix-fake-claude-code-amatera-stealer</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/platform</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/solutions</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/10-best-ai-newsletters-you-must-subscribe-to</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/90-of-successful-attacks-seen-in-the-wild-resulted-in-leaked-sensitive-data</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/a-deep-dive-into-llm-jailbreaking-techniques-and-their-implications</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/a-milestone-for-pillar-honored-as-frost-sullivans-2025-competitive-strategy-leader-for-ai-security</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/addressing-vertical-agentic-risks-with-taint-analysis</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/agentic-ci-cd-security-risks-attack-vectors-and-controls</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/agentic-use-cases-and-challenges-for-2025</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/ai-agents-in-the-workforce-the-future-of-team-collaboration-and-efficiency</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/ai-asset-inventory-the-foundation-of-ai-governance-and-security</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/ai-coding-tools-under-fire-mapping-the-malvertising-campaigns-targeting-the-vibe-coding-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/ai-red-teaming-ensuring-safe-and-secure-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/ai-red-teaming-playbook</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/ai-red-teaming-regulations-and-standards</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/ai-security-trends-to-watch-in-2025</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/ai-systems-must-be-secured-by-design</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/analyzing-the-amazon-q-incident-using-the-sail-framework</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/anatomy-of-an-indirect-prompt-injection</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/ask-gordon-meet-the-attacker-prompt-injection-in-dockers-built-in-ai-assistant</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/best-practices-for-securely-deploying-ai-systems-insights-from-nsas-latest-report</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/beyond-devsecops-pillars-approach-for-securing-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/building-ai-powered-software-prepare-to-answer-these-11-security-questions</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/building-secure-and-reliable-ai-agents-a-new-development-life-cycle</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/building-your-ai-security-roadmap</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/californias-sb-1047-a-landmark-bill-for-safe-and-responsible-ai-innovation</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/caught-in-the-wild-real-attack-traffic-targeting-exposed-clawdbot-gateways</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/code-red-in-the-age-of-ai-your-data-is-executable</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/embracing-security-in-ai-unpacking-the-new-iso-iec-5338-standard</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/from-ai-discovery-to-attack-surface-mapping-announcing-the-wiz-pillar-partnership</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/from-data-breaches-to-legal-liabilities-the-hidden-risks-of-ai-chatbots</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/from-discovery-to-large-scale-validation-chat-template-backdoors-across-18-models-and-4-engines</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/from-rules-to-guardrails-navigating-the-new-age-of-ai-with-security-at-heart</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/from-shift-left-to-shift-up-securing-the-new-ai-abstraction-layer</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/from-static-scanning-to-recursive-loops-lessons-from-a-decade-in-data-science-and-ai</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/genai-tools-in-the-workplace-5-emerging-threat-scenarios</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/hackerbot-claw-adversarial-agent-targets-top-github-repos</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/how-ai-coding-assistants-could-be-compromised-via-rules-file</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/how-genai-is-becoming-a-prime-target-for-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/how-will-ai-change-the-future-of-the-workforce-and-what-are-the-security-implications</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/introducing-pillar-for-agentic-ci-cd</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/introducing-pillar-for-ai-coding-agents</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/introducing-the-sail-framework-a-practical-guide-to-secure-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/key-questions-for-secure-deployment-of-large-language-models</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/large-language-models-are-not-inventions-theyre-discoveries</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/llm-attacks-take-just-42-seconds-on-average-20-of-jailbreaks-succeed</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/llm-backdoors-at-the-inference-level-the-threat-of-poisoned-templates</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/llm-jailbreaking-the-new-frontier-of-privilege-escalation-in-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/llms-are-an-essential-kernel-process-of-a-new-operating-system</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/manipulating-llm-agents-a-case-study-in-prompt-injection-attacks</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/my-agentic-trust-issues-from-prompt-injection-to-supply-chain-compromise-on-gemini-cli</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/n8n-sandbox-escape-critical-vulnerabilities-in-n8n-exposes-hundreds-of-thousands-of-enterprise-ai-systems-to-complete-takeover</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/new-rules-file-backdoor-attack-lets-hackers-inject-malicious-code-via-ai-code-editors</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/new-vulnerability-in-github-copilot-and-cursor-how-hackers-can-weaponize-code-agents</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/not-all-ai-boms-are-created-equal</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/operation-bizarre-bazaar-first-attributed-llmjacking-campaign-with-commercial-marketplace-monetization</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/owasp-top-10-for-llms-visualized</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/pillar-and-portkey-join-forces-to-enhance-security-for-ai-applications</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/pillar-partners-with-tavily-to-secure-web-access-for-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/pillar-security-is-now-available-in-the-aws-marketplace</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/pillar-security-is-now-available-in-the-microsoft-azure-marketplace</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/pillar-security-raises-9m-to-help-companies-build-and-run-secure-ai-software</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/pillar-security-unveils-redgraph-the-worlds-first-attack-surface-mapping-continuous-testing-for-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/pillar-securitys-enhanced-amazon-bedrock-integration-complete-ai-security-and-governance</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/pillar-selected-for-the-aws-crowdstrike-cybersecurity-accelerator</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/pillar-truefoundry-runtime-ai-protection-built-into-the-gateway</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/practical-ai-red-teaming-the-power-of-multi-turn-tests-vs-single-turn-evaluations</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/prompt-injection-leads-to-rce-and-sandbox-escape-in-antigravity</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/red-teaming-for-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/redefining-security-roles-for-the-ai-era-responsibilities-and-controls</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/rethinking-ai-security-beyond-the-deepseek-r1-vulnerability-metrics</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/revolutionizing-cybersecurity-the-kill-chain-in-the-age-of-ai</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/safeguarding-the-future-lessons-learned-from-securing-over-1-000-genai-apps</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/securing-ai-a-blend-of-old-and-new-security-practices</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/securing-ai-on-premise-full-data-control-with-pillar</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/securing-context-engineering</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/securing-multimodal-ai</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/securing-the-agentic-workforce</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/securing-your-ai-via-ai-gateways</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/security-for-ai-agents-101</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/security-for-ai-buyers-guide</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/strengthening-llm-security-insights-from-owasps-2025-top-10-list</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/the-agent-economy-who-commands-the-fleet</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/the-agent-security-paradox-when-trusted-commands-in-cursor-become-attack-vectors</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/the-cornerstone-of-effective-security-platforms-lessons-from-a-decade-in-the-edr-space</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/the-hidden-security-risks-of-swe-agents-like-openai-codex-and-devin-ai</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/the-impending-challenges-for-generative-ai-a-closer-look</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/the-new-ai-attack-surface-3-ai-security-predictions-for-2026</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/the-rise-of-dark-ai-tools-techniques-and-ai-driven-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/the-security-risks-of-model-context-protocol-mcp</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/the-state-of-attacks-on-genai-industry-first-analysis-of-real-world-interactions</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/the-terminology-problem-causing-security-teams-real-risks</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/top-5-ai-jailbreaking-communities-to-follow</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/traditional-appsec-vs-ai-security-addressing-modern-risks</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/understanding-iso-42005-ai-impact-assessment</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/understanding-the-default-protection-layers-of-generative-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/understanding-the-security-risks-of-ai-applications</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/unlocking-the-power-of-ai-agents-from-monolithic-models-to-intelligent-assistants</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/what-is-ai-assets-sprawl-causes-risks-and-control-strategies</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/what-the-anthropic-ai-espionage-disclosure-tells-us-about-ai-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/why-im-joining-pillar-security-by-jenna-raby</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/your-ai-agent-will-run-untrusted-code-now-what</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/blog/zero-click-unauthenticated-rce-in-n8n-a-contact-form-that-executes-shell-commands</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/absence-of-ai-specific-incident-response-plan</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/adversarial-evasion</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/agentic-system-self-modification</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/autonomous-agent-misuse</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/autonomous-code-execution-abuse</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/autonomous-policy-compliance-violation</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/autonomous-resource-provisioning-abuse</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/context-window-overwrite-manipulation</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/covert-channel-use-evasion</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/cross-agent-inter-agent-abuse</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/cross-domain-prompt-injection-xpia</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/data-exfiltration-via-monitoring-telemetry</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/data-poisoning-and-integrity-issues</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/denial-of-service-resource-exhaustion</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/direct-prompt-injection</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/discovery-of-outdated-or-orphaned-ai-assets</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/dynamic-on-the-fly-dependency-injection</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/experiment-output-data-leakage</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/exposed-ai-access-credentials-in-discovered-assets</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/exposed-or-hardcoded-credentials-in-build-artifacts</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/failure-to-specify-or-enforce-secure-model-requirements</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/governance-misalignment</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/inadequate-ai-audit-trails</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/inadequate-ai-policy</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/inadequate-compliance-mapping</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/incomplete-asset-inventory-xorgz</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/incomplete-red-team-coverage</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/incomplete-threat-modeling-for-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/indirect-prompt-instruction-injection</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/insecure-api-endpoint-configuration</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/insecure-experiment-logging-monitoring</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/insecure-memory-logging</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/insecure-ml-data-pipeline-jobs</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/insecure-output-handling</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/insecure-plugin-tool-integration</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/insecure-storage-of-red-teaming-artifacts</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/insecure-system-prompt-design</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/insecure-temporary-artifacts-or-intermediate-data-storage</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/insufficient-ai-interaction-logging</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/insufficient-human-oversight-in-model-development</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/insufficient-multimodal-security-testing</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/insufficient-understanding-of-ai-system-boundaries</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/intellectual-property-ip-theft-of-models</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/lack-of-clarity-on-ai-system-purpose-and-criticality</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/lack-of-risk-assessment-process</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/limited-foreign-language-red-teaming</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/limited-scope-of-evasion-technique-testing</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/malicious-content-generation</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/misclassified-or-undocumented-sensitive-data-usage</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/missing-documented-evidence-of-red-teaming-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/missing-real-time-security-alerts</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/model-backdoor-insertion-or-tampering</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/model-theft-extraction</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/outdated-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/overlooked-embedded-or-inherited-ai-functionality</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/overly-permissive-permissions-in-experimentation</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/policy-violating-output</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/resource-abuse</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/sensitive-data-leakage</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/shadow-ai-deployment</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/system-prompt-leakage</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/task-decomposition-for-policy-evasion</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/unauthorized-prohibited-component-usage</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/unauthorized-system-prompt-update-tampering</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/undefined-risk-tolerance-categorization</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/undetected-model-drift-degradation</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/undocumented-data-flows-and-lineage</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/unidentified-third-party-ai-integrations</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/unmonitored-ai-experimentation</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/unrestricted-api-tool-invocation</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/untested-model</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/unvetted-use-of-open-source-and-third-party-ai-components</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/ai-risks/vulnerable-ai-frameworks-and-libraries</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/open-position/account-executive</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/open-position/account-executivei-emea</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/open-position/sales-engineer</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/open-position/senior-software-engineer</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/agentic-ai-red-teaming-playbook/building-an-hypothesis</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/agentic-ai-red-teaming-playbook/context-engineering-101</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/agentic-ai-red-teaming-playbook/executive-summary</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/agentic-ai-red-teaming-playbook/modeling</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/agentic-ai-red-teaming-playbook/prompt-injections-101</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/agentic-ai-red-teaming-playbook/prompt-programming-attack-patterns</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/agentic-ai-red-teaming-playbook/reconnaissance</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/agentic-ai-red-teaming-playbook/the-ai-kill-chain</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/agentic-ai-red-teaming-playbook/the-cfs-model</loc>
    </url>
    <url>
        <loc>https://www.pillar.security/agentic-ai-red-teaming-playbook/why-red-team-ai</loc>
    </url>
</urlset>