<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://www.getsafety.com/</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/research</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/glossary</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/careers</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/glossary/edr-limitations-developers</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/glossary/ai-coding-assistant-security-risks</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/glossary/mcp-server-security-risks</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/glossary/ide-extension-security</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/glossary/npm-pypi-package-security</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/magicwolf</loc>
    <lastmod>2026-02-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/open-source-supply-chain-threats-january-2026</loc>
    <lastmod>2026-02-18</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/react-native-glassworm</loc>
    <lastmod>2026-03-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/malicious-packages-hide-pypi</loc>
    <lastmod>2026-03-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/axios-takeover-compromise</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/ai-agent-skills-the-story-of-how-we-got-acquainted</loc>
    <lastmod>2026-03-13</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/why-your-employee-workstation-is-the-new-target-for-software-supply-chain-attacks</loc>
    <lastmod>2026-02-18</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/teampcp-strikes-again-telnyx</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/litellm-pypi-compromised</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/agentic-endpoint-security</loc>
    <lastmod>2026-03-11</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/open-source-supply-chain-threats-february-2026-in-review</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/tiktok-tutorials-compromise-clients</loc>
    <lastmod>2026-03-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/grokwrapper</loc>
    <lastmod>2026-02-10</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/extrazip-malware-campaign</loc>
    <lastmod>2026-02-05</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/telegrem-bot-malware</loc>
    <lastmod>2026-01-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/open-source-supply-chain-threats-december-2025</loc>
    <lastmod>2026-01-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/malicious-hash-validation-packages</loc>
    <lastmod>2026-01-05</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/shai-hulud-3-0</loc>
    <lastmod>2025-12-29</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/scopper-python-rat</loc>
    <lastmod>2025-12-27</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/polymarket-targeted-by-malicious-packages</loc>
    <lastmod>2025-12-21</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/owasp-top-10-2025</loc>
    <lastmod>2025-11-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/npm-malware-uses-cloaking</loc>
    <lastmod>2025-11-18</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/two-types-of-software-risk</loc>
    <lastmod>2025-11-15</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/malicious-claude-code-package</loc>
    <lastmod>2025-10-27</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/javascript-rat-targets-banks</loc>
    <lastmod>2025-10-22</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/jackpotmasters-credential-phishing-attack</loc>
    <lastmod>2025-09-25</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/shai-hulud-npm-attack</loc>
    <lastmod>2025-09-16</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/massive-npm-attack</loc>
    <lastmod>2025-09-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/analyzing-nx-ai-prompt</loc>
    <lastmod>2025-09-04</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/nx-npm-attack</loc>
    <lastmod>2025-09-02</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/infostealer-targets-russian-crypto-developers</loc>
    <lastmod>2025-08-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/threat-actor-uses-ai-to-create-a-better-crypto-wallet-drainer</loc>
    <lastmod>2025-07-31</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/how-we-built-a-thriving-co-op-program</loc>
    <lastmod>2025-07-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/bill-c-8-canada-cybersecurity-strategy</loc>
    <lastmod>2025-07-16</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/eu-canada-security-and-defence-partnership</loc>
    <lastmod>2025-06-25</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/solana-drainer</loc>
    <lastmod>2025-05-29</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/yeshen-asia-threat-campaign</loc>
    <lastmod>2025-05-15</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/russian-hackers-manipulate-npm-to-make-realistic-packages</loc>
    <lastmod>2025-04-15</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/payment-processor-publishes-official-npm-package-that-leaks-credit-card-data-via-ngrok</loc>
    <lastmod>2025-04-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/severity-and-the-common-vulnerability-scoring-system-cvss</loc>
    <lastmod>2025-03-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/beyond-cvss-project-context-exploitability-and-reachability-of-vulnerabilities</loc>
    <lastmod>2025-03-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/python-security-best-practices-for-developers</loc>
    <lastmod>2025-03-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/intro-to-software-supply-chain</loc>
    <lastmod>2025-03-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/securing-the-software-supply-chain-for-python-developers-part-2</loc>
    <lastmod>2025-03-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/libwebp-special-vulnerability-advisory-cve-2023-4863</loc>
    <lastmod>2025-03-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/curl-vulnerability-cve-2023-38545-for-python-systems</loc>
    <lastmod>2025-03-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/lessons-from-the-recent-pytorch-supply-chain-attack</loc>
    <lastmod>2025-03-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/nvd-update-delays</loc>
    <lastmod>2025-03-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/typosquatting-cyberattack-on-pypi-suspends-new-user-and-project-creation</loc>
    <lastmod>2025-03-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/navigating-the-nvd-backlog-with-safetys-leading-vulnerability-data</loc>
    <lastmod>2025-03-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/protecting-ai-integrity</loc>
    <lastmod>2025-03-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/executive-order-14028</loc>
    <lastmod>2025-03-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/ultralytics-attack-supply-chain</loc>
    <lastmod>2024-04-02</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/building-an-effective-engineering-career-framework</loc>
    <lastmod>2024-04-02</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/cryptoaitools-supply-chain-attack</loc>
    <lastmod>2024-04-02</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/canada-cyber-threat-assessment</loc>
    <lastmod>2024-04-02</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/tensorflow-vulnerability-discovery</loc>
    <lastmod>2024-04-02</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/security-vulnerability-in-the-llama-cpp-python-package</loc>
    <lastmod>2024-04-02</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://www.getsafety.com/blog-posts/open-source-licenses-risks-compliance</loc>
    <lastmod>2024-04-02</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
</urlset>