<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://agentsecurity.com/</loc></url>
<url><loc>https://agentsecurity.com/blog</loc></url>
<url><loc>https://agentsecurity.com/404</loc></url>
<url><loc>https://agentsecurity.com/category/ai-agents</loc></url>
<url><loc>https://agentsecurity.com/category/mcp-security</loc></url>
<url><loc>https://agentsecurity.com/category/benchmarks</loc></url>
<url><loc>https://agentsecurity.com/category/news</loc></url>
<url><loc>https://agentsecurity.com/category/glossary</loc></url>
<url><loc>https://agentsecurity.com/author/parth-deshmukh</loc></url>
<url><loc>https://agentsecurity.com/author/lara-iglesias</loc></url>
<url><loc>https://agentsecurity.com/author/rodrigo</loc></url>
<url><loc>https://agentsecurity.com/author/team</loc></url>
<url><loc>https://agentsecurity.com/author/admin</loc></url>
<url><loc>https://agentsecurity.com/blog/ai-agent-started-mining-crypto-in-secret</loc></url>
<url><loc>https://agentsecurity.com/blog/the-hidden-risk-of-alignment-faking-in-enterprise-systems</loc></url>
<url><loc>https://agentsecurity.com/blog/inside-the-mckinsey-ai-chatbot-hack-how-an-autonomous-agent-gained-read-write-access</loc></url>
<url><loc>https://agentsecurity.com/blog/ai-chatbot-logging-is-a-security-problem</loc></url>
<url><loc>https://agentsecurity.com/blog/langchain-deep-agents</loc></url>
<url><loc>https://agentsecurity.com/blog/why-your-enterprise-cannot-treat-ai-agents-like-traditional-it-assets</loc></url>
<url><loc>https://agentsecurity.com/blog/top-10-guardian-agents-for-securing-enterprise-ai-systems-in-2026</loc></url>
<url><loc>https://agentsecurity.com/blog/meta-acquisition-of-moltbook</loc></url>
<url><loc>https://agentsecurity.com/blog/mwc-2026-highlights-the-rise-of-ai-agent-security-in-enterprise-ai</loc></url>
<url><loc>https://agentsecurity.com/blog/preventing-shadow-ai-agents-in-your-company-a-security-framework-for-enterprise-ai-governance</loc></url>
<url><loc>https://agentsecurity.com/blog/the-ciso-checklist-for-securing-enterprise-ai-agents</loc></url>
<url><loc>https://agentsecurity.com/blog/cursor-security-risks-and-the-expanding-attack-surface-of-ai-driven-development</loc></url>
<url><loc>https://agentsecurity.com/blog/why-rbac-is-not-enough-for-ai-agents</loc></url>
<url><loc>https://agentsecurity.com/blog/agent-forensics-how-to-investigate-incidents-in-autonomous-ai-systems</loc></url>
<url><loc>https://agentsecurity.com/blog/memory-poisoning-in-autonomous-ai-agents</loc></url>
<url><loc>https://agentsecurity.com/blog/moltbook-the-ai-only-social-network-and-its-risks</loc></url>
<url><loc>https://agentsecurity.com/blog/agent-security-competitive-landscape-analysis</loc></url>
<url><loc>https://agentsecurity.com/blog/2026-the-year-of-ai-agents</loc></url>
<url><loc>https://agentsecurity.com/blog/openai-agentkit-guide</loc></url>
<url><loc>https://agentsecurity.com/blog/red-teaming-for-ai-agents</loc></url>
<url><loc>https://agentsecurity.com/blog/what-is-mcp-authentication</loc></url>
<url><loc>https://agentsecurity.com/blog/best-mcp-scanners</loc></url>
<url><loc>https://agentsecurity.com/blog/owasp-agentic-ai-security-guidelines</loc></url>
<url><loc>https://agentsecurity.com/blog/best-mcp-gateways</loc></url>
<url><loc>https://agentsecurity.com/blog/how-to-deploy-an-ai-agent</loc></url>
<url><loc>https://agentsecurity.com/blog/security-for-agents-vs-agents-for-security</loc></url>
<url><loc>https://agentsecurity.com/blog/gartner-top-8-ai-gateways</loc></url>
<url><loc>https://agentsecurity.com/blog/mcp-security-risks</loc></url>
<url><loc>https://agentsecurity.com/blog/agent-security-risks</loc></url>
<url><loc>https://agentsecurity.com/blog/agent-security-platforms</loc></url>
<url><loc>https://agentsecurity.com/blog/why-multi-agent-systems-fail</loc></url>
<url><loc>https://agentsecurity.com/blog/agent-security-vs-ai-security</loc></url>
<url><loc>https://agentsecurity.com/blog/data-leakage-in-ai-agents</loc></url>
<url><loc>https://agentsecurity.com/blog/governing-agentic-ai</loc></url>
<url><loc>https://agentsecurity.com/blog/features-ai-agent-security-platforms</loc></url>
<url><loc>https://agentsecurity.com/blog/prevent-prompt-injections-in-ai-agents</loc></url>
<url><loc>https://agentsecurity.com/blog/ai-agent-platforms</loc></url>
</urlset>