<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://snailsploit.com/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>weekly</changefreq><priority>1.0</priority></url><url><loc>https://snailsploit.com/about/</loc><lastmod>2026-02-01T00:00:00.000Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://snailsploit.com/adversarial-minds/</loc><lastmod>2026-01-15T00:00:00.000Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://snailsploit.com/ai-security/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://snailsploit.com/ai-security/aatmf-vs-mitre-atlas/</loc><lastmod>2026-02-12T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/adversarial-prompting/</loc><lastmod>2026-03-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/agentic-ai-threat-landscape/</loc><lastmod>2026-02-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/ai-breach-detection-gap/</loc><lastmod>2026-02-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/ai-coding-agent-attack-surface/</loc><lastmod>2026-02-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/ai-gateway-threat-model/</loc><lastmod>2026-01-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/ai-social-engineering-deepfake/</loc><lastmod>2025-09-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/computational-countertransference/</loc><lastmod>2026-02-18T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/hidden-risks-offensive-perspective/</loc><lastmod>2025-08-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/jailbreaking/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/jailbreaking/ai-inherent-vulnerability/</loc><lastmod>2025-07-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/jailbreaking/chatgpt-context-jailbreak/</loc><lastmod>2025-08-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/jailbreaking/context-inheritance-exploit/</loc><lastmod>2025-09-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/jailbreaking/inherent-ai-vulnerabilities/</loc><lastmod>2025-10-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/jailbreaking/jailbreak-techniques/</loc><lastmod>2026-03-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/jailbreaking/memory-manipulation-attacks/</loc><lastmod>2025-11-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/llm-red-teamers-playbook/</loc><lastmod>2026-02-14T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/mcp-vs-a2a-attack-surface/</loc><lastmod>2026-03-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/prompt-injection/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/prompt-injection/custom-instruction-backdoor/</loc><lastmod>2025-08-25T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/prompt-injection/mcp-security-deep-dive/</loc><lastmod>2025-12-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/prompt-injection/mcp-threat-analysis/</loc><lastmod>2025-12-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/prompt-injection/memory-injection-nested-skills/</loc><lastmod>2026-03-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/prompt-injection/prompt-injection-examples/</loc><lastmod>2026-03-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/rag-agentic-attack-surface/</loc><lastmod>2025-11-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/rai-judge-blind-spots/</loc><lastmod>2026-02-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/self-replicating-memory-worm/</loc><lastmod>2026-03-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/structural-vulnerabilities-llms/</loc><lastmod>2025-10-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/weaponized-ai-supply-chain/</loc><lastmod>2026-03-04T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/attacks/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/attacks/adversarial-examples/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/attacks/agent-hijacking/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/attacks/backdoor-attacks/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/attacks/data-poisoning/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/attacks/guardrail-bypass/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/attacks/indirect-prompt-injection/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/attacks/jailbreaking/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/attacks/membership-inference/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/attacks/model-extraction/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/attacks/supply-chain-attacks/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/attacks/system-prompt-extraction/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/attacks/training-data-extraction/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/concepts/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/concepts/adversarial-ai/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/concepts/ai-agents/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/concepts/ai-alignment/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/concepts/ai-red-teaming/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/concepts/hallucination/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/concepts/large-language-models/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/concepts/prompt-injection/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/concepts/rag/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/defenses/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/defenses/guardrails/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/defenses/human-in-the-loop/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/defenses/input-validation/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/defenses/output-filtering/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/ai-security/wiki/defenses/rate-limiting/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/contact/</loc><lastmod>2026-01-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/frameworks/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://snailsploit.com/frameworks/aatmf/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/frameworks/aatmf/advanced-tactics/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/frameworks/aatmf/appendices/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/frameworks/aatmf/core-tactics/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/frameworks/aatmf/foundations/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/frameworks/aatmf/governance/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/frameworks/aatmf/infrastructure/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/frameworks/aatmf/operations/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/frameworks/aatmf/prompt-bank/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/frameworks/prompt/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/frameworks/sef/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url><url><loc>https://snailsploit.com/security-research/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://snailsploit.com/security-research/cves/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/security-research/cves/cve-2025-9776/</loc><lastmod>2025-05-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url><url><loc>https://snailsploit.com/security-research/cves/cve-2025-11171/</loc><lastmod>2025-06-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url><url><loc>https://snailsploit.com/security-research/cves/cve-2025-11174/</loc><lastmod>2025-06-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url><url><loc>https://snailsploit.com/security-research/cves/cve-2025-12030/</loc><lastmod>2025-07-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url><url><loc>https://snailsploit.com/security-research/cves/cve-2025-12163/</loc><lastmod>2025-07-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url><url><loc>https://snailsploit.com/security-research/cves/cve-2026-1208/</loc><lastmod>2026-01-23T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url><url><loc>https://snailsploit.com/security-research/cves/cve-2026-3288/</loc><lastmod>2026-03-09T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url><url><loc>https://snailsploit.com/security-research/cves/cve-2026-32809/</loc><lastmod>2026-03-16T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url><url><loc>https://snailsploit.com/security-research/cves/cve-2026-32885/</loc><lastmod>2026-03-17T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url><url><loc>https://snailsploit.com/security-research/cves/cve-2026-33693/</loc><lastmod>2026-03-23T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url><url><loc>https://snailsploit.com/security-research/general/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/security-research/general/advanced-container-escapes/</loc><lastmod>2025-03-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/security-research/general/chatgpt-canvas-rce-dns-exfiltration/</loc><lastmod>2025-04-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/security-research/general/cloud-vulnerability-exploitation/</loc><lastmod>2025-05-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/security-research/general/edr-evasion-techniques/</loc><lastmod>2025-06-05T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/security-research/general/io-uring-zcrx-race-condition/</loc><lastmod>2026-03-11T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/security-research/general/zero-trust-container-runtime/</loc><lastmod>2025-07-01T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/services/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/sitemap/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/tools/</loc><lastmod>2026-03-10T00:00:00.000Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://snailsploit.com/tools/jailbreak-engine/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/writing/</loc><lastmod>2026-03-26T00:00:00.000Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://snailsploit.com/writing/ai-obfuscator-detection-bypass/</loc><lastmod>2025-04-20T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/writing/embracing-ai-adapt-or-die/</loc><lastmod>2025-03-10T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url><url><loc>https://snailsploit.com/writing/personal-data-identity-theft/</loc><lastmod>2025-02-15T00:00:00.000Z</lastmod><changefreq>monthly</changefreq><priority>0.7</priority></url></urlset>