<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.aikido.dev</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/company/about</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/industries/aikido-for-agencies</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/industries/aikido-for-enterprise</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/industries/aikido-for-fintech</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/industries/pe-group-companies</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/industries/aikido-for-hrtech</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/industries/aikido-for-legaltech</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/vanta-integration</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/application-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/application-security-posture-management-aspm</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/partner</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/book-a-demo-ty</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/company/careers</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/cloud/cloud-posture-management-cspm</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/contact</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code/container-image-scanning</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/dependabot-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/github-advanced-security-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/gitlab-ultimate-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/guardrails-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/industries/healthtech</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code/infrastructure-as-a-code-iac</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/javascript-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code/open-source-license-risk</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code/malware-detection-in-dependencies</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/mend-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code/open-source-dependency-scanning-sca</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/orca-security-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/company/press-kit</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/pricing</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code/secrets-detection</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/secure-your-source-code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/soc2-iso-compliance</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/snyk-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/signup-succesful</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code/static-code-analysis-sast</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/attack/surface-monitoring-dast</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/trust-center</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/wall-of-love</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code/outdated-eol-software</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/industries/aikido-for-startups</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/sbom-generator-create-software-bill-of-materials</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/wordpress-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/industries/medtech</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/veracode-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/sprinto-integration</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/drata-integration</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/landing/aikido-notion-capital</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/landing/aikido-singular</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/aikido-thoropass-integration</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/landing/aikido-morrow-perks</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/protect/zen</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/sast-dast</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/landing/aikido-northzone</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/partners/aws</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/industries/security-tech</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/landing/aikido-octopus-ventures</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/wiz-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/jit-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/saas-cto-security-checklist-success</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/aspm-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/landing/aikido-cto-craft</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/landing/aikido-westcap</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/landing/aikido-prodigy13</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/talk-to-a-human-ty</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code/autofix</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/industries/defense-technology</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-stories</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/landing/aikido-brainframe</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/cycode-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/attack/api-scanning</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/open-source</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/ai-at-aikido</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/checkmarx</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/semgrep</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/mobile-apps</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/yamory-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code/ci-cd-pipeline-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/protect/zen-introduction</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/industries/software-security-for-smart-manufacturing-engineering</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/landing/secure-your-javascript-sast</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/software-security-tools/getting-started</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/software-security-tools/categories</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/software-security-tools/implementing-software-security-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/aikido-vs-sonarqube</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code/ide-integrations</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/cloud/virtual-machine-scanning</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/prevent-owasp-top-10-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/iast</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/secure-ai-generated-code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code/local-scanner</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/partners/microsoft</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/landing/vulnerability-monitoring-platform</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/landing/python-code-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/company/europe-office</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/company/san-francisco-office</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/vulnerability-management-platform</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/software-security-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance-frameworks</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance-frameworks/getting-started</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance-frameworks/major-frameworks</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance-frameworks/implementing-compliance</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/secure-development</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/secure-development/secure-development-matters</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/secure-development/build-secure-software</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/secure-development/compliance-development</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/codacy-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/industries/government-public-sector</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code/code-quality</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/partners/root</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/aikido-for-students</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/industries/software-security-for-banking-finance</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/ox-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/aikido-for-higher-education</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/legal-history</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/aikido-vs-coderabbit</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/aikido-vs-contrast-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/qodo-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/aikido-vs-greptile</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/aikido-vs-tabnine</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/use-cases/aikido-secureframe-integration</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/free-open-source-ai-code-review2</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/attack/aipentest</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/platform</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/platform/code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/platform/cloud</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/platform/protect</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/platform/attack</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/state-of-ai-security-development-2026</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/protect/safe-chain</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/blackduck-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/aikido-vs-snyk</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/endor-labs</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/xbow</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/attack/infinite</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/aikido-vs-snyk-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/aikido-vs-tenable-nessus</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/aikido-vs-qualys</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/cloud/hardened-images</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/aikido-vs-burp-suite</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/industries/telecom</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/reports</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/aikido-vs-casco</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/aikido-vs-pentera</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/aikido-vs-novee-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/industries/european-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/aikido-rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/hackerone-ptaas</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/platform-pricing</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/partners/aikido-lovable</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/aws-security-agent</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/protect/device-protection</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/integrations/kiro</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/comparison/aikido-vs-koi</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/policies/cookies</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/policies/privacy</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/policies/security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/policies/terms</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/110000-sites-affected-by-the-polyfill-supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/3-key-steps-to-strengthen-compliance-and-risk-management</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/a-guide-to-automating-technical-vulnerability-management-for-soc-2</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/a-no-bs-docker-security-checklist-for-the-vulnerability-minded-developer</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/agent-skills-spreading-hallucinated-npx-commands</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/ai-as-a-power-tool-how-windsurf-and-devin-are-changing-secure-coding</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/ai-code-review-guide</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/ai-for-code-review</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/ai-for-pentesting</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/ai-pentest-hoppscotch-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/ai-pentesting-agent-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/ai-pentesting-compliance</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/ai-pentesting-demo</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/ai-pentesting-safety-requirements</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/ai-tools-for-coding</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/aikido-for-students-and-educators</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/aikido-funding-series-b</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/aikido-joins-the-aws-partner-network</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/aikido-secureframe</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/aikido-security-achieves-iso-270012022-compliance</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/aikido-security-raises-eur2-million-pre-seed-round-to-build-a-developer-first-software-security-platform</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/aikido-security-raises-eur5m-to-offer-a-seamless-security-solution-to-growing-saas-businesses</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/aikido-strengthens-cronos-group-security-posture</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/aikido-x-kiro</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/aikido-x-root-io-harden-your-containers-without-the-headaches</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/allseek-and-haicker-are-joining-aikido</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/anthropic-mythos-cybersecurity-risks-overblown</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/api-security-testing</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/api-security-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/apiiro-alternatives</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/app-security-problems-top-10</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/appsec-threats</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/aspm-features-and-capabilities</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/autotriage-and-the-swiss-cheese-model-of-security-noise-reduction</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/autotriage-ide</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/axios-cve-2026-40175-a-critical-bug-thats-not-exploitable</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/axios-npm-compromised-maintainer-hijacked-rat</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/balancing-security-when-to-leverage-open-source-tools-vs-commercial-solutions</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/best-ai-code-review-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/best-ai-pentesting-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/best-end-of-life-detection-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/best-sbom-generation-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/best-veracode-alternatives-for-application-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/betterleaks-gitleaks-successor</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/blackduck-alternatives</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/breaking-changes</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/browser-extension-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/browser-extensions-supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/bug-bounty-isnt-dead</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/build-secure-admin-panel</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/checklist-github-actions</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/checkmarx-alternatives</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/checkmarx-vs-blackduck</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/cloud-application-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/cloud-code-security-cto-consultation</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/cloud-compliance-frameworks</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/cloud-container-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/cloud-native-security-platforms</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/cloud-security-architecture</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/cloud-security-assessment</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/cloud-security-devops</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/cloud-security-features-and-capabilities</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/cloud-security-threats</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/code-quality-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/code-review-best-practices</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/command-injection-in-2024-unpacked</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/common-code-review-mistakes</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/container-scanning-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/container-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/container-security-guide</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/continuous-code-quality-ci-cd</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/continuous-pentesting-ci-cd</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/cyber-resilience-act-compliance</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/cybersecurity-essentials-for-legaltech-companies</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/cycode-alternatives</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/dast-features-and-capabilities</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/dast-vs-pen-testing-vs-ai-pentesting</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/detecting-preventing-modern-supply-chain-malware</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/diy-guide-build-vs-buy-your-oss-code-scanning-and-app-security-toolkit</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/docker-kubernetes-container-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/drata-aikido-integration-automates-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/duckdb-npm-packages-compromised</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/endor-labs-alternatives</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/endpoint-security-for-developer-devices</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/european-companies-cybersecurity-partner-aikido</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/fake-clawdbot-vscode-extension-malware</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/fake-tanstack-packages-steal-env-files</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/fast-draft-open-vsx-bloktrooper</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/free-hands-on-security-labs-for-your-students</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/frost-sullivan-leadership-award-2026</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/future-of-api-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/future-of-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/get-the-tl-dr-tj-actions-changed-files-supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/github-actions-incident-shai-hulud-supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/github-advanced-security-alternatives</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/gitlab-ultimate-alternatives</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/glassworm-chrome-extension-rat</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/glassworm-returns-unicode-attack-github-npm-vscode</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/glassworm-strikes-react-packages-phone-numbers</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/glassworm-zig-dropper-infects-every-ide-on-your-machine</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/gpt-proxy-backdoor-npm-pypi-chinese-llm-relay</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/hacker-superpower-ai</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/how-a-startups-cloud-got-taken-over-by-a-simple-form-that-sends-an-email</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/how-aikido-and-deloitte-are-bringing-developer-first-security-to-enterprise</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/how-does-a-saas-startup-cto-balance-development-speed-and-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/iac-security-scanning-terraform-kubernetes-misconfigurations</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/idor-vulnerability-explained</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/improve-code-quality</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/introducing-aikido-ai-cloud-search</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/introducing-aikido-expansion-packs</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/introducing-aikido-infinite</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/introducing-aikido-package-health</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/introducing-safe-chain</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/invisible-unicode-malware-strikes-openvsx-again</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/iso-27001-certification-top-tips</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/iso-270012022-preparation</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/jit-io-alternatives</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/launching-aikido-for-cursor-ai</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/launching-aikido-malware---open-source-threat-feed</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/loctax-eliminates-false-positives</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/lovable-aikido-pentesting</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/malicious-package-web3</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/malware-hiding-in-plain-sight-spying-on-north-korean-hackers</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/manual-vs-automated-code-review</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/manual-vs-automated-pentesting</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/meet-intel-aikidos-open-source-threat-feed-powered-by-llms</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/mendio-alternatives</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/metamorphosis-mythos-era</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/mini-shai-hulud-is-back-tanstack-compromised</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/mongobleed-mongodb-zlib-vulnerability-cve-2025-14847</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/multi-cloud-vs-hybrid-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/mythos-ready-checklist</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/new-aikido-security-features-august-2023</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/nis2-who-is-affected</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/nist-nvd-changes-2026</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/npm-debug-and-chalk-packages-compromised</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/opengrep-sast-one-year</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/orca-security-alternatives</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/ox-security-alternatives</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/path-traversal-in-2024-the-year-unpacked</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/pentest-gpt</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/pentesting-speed-gap-security-testing</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/popular-nx-packages-compromised-on-npm</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/prevent-fallout-when-cicd-platform-hacked</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/prevent-prototype-pollution</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/prisma-and-postgresql-vulnerable-to-nosql-injection</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/promptpwnd-github-actions-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/pull-request-best-practices</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/pytorch-lightning-pypi-compromise-mini-shai-hulud</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/quantum-incident-response</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/react-native-aria-attack</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/reasoning-models-autotriage</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/reducing-cybersecurity-debt-with-ai-autotriage</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/rolling-out-developer-security-in-a-5-000-engineer-organization</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/roundcube-xss-cookie-tossing</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/rsa-2026-parties</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/saas-cto-security-checklist-old</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/safechain-minimum-package-age</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/sast-features-and-capabilities</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/sast-in-the-ide-is-now-free</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/sast-vs-dast-what-you-need-to-now</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/sca-in-ide-scan-and-fix-dependencies</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/secret-detection-application-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/secrets-detection-what-to-look-for-when-choosing-a-tool</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/secure-sdlc</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/securing-open-source-dependencies-with-aikido-and-tuxcare</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/security-acronyms</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/security-ai-development-windsurf-aikido</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/security-assessment-report-closes-deals-faster</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/security-in-fintech</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/security-masterclass-supabase-and-lovable</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/sensing-and-blocking-javascript-sql-injection-attacks-aikido-firewall</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/shadow-ai-is-a-fear-response-and-banning-it-makes-it-worse</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/shai-hulud-npm-bitwarden-cli-compromise</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/shai-hulud-strikes-again---the-golden-path</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/shai-hulud-strikes-again-hitting-zapier-ensdomains</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/snyk-vs-aikido-security-g2-reviews-snyk-alternative</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/snyk-vs-black-duck</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/snyk-vs-checkmarx</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/snyk-vs-github-advanced-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/snyk-vs-mend</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/snyk-vs-semgrep</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/snyk-vs-veracode</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/snyk-vs-wiz</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/soc-2-certification-tips</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/software-supply-chain-security-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/sonarqube-vs-checkmarx</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/sonarqube-vs-codacy</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/sonarqube-vs-coverity</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/sonarqube-vs-fortify</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/sonarqube-vs-semgrep</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/sonarqube-vs-sonarcloud</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/sonarqube-vs-veracode</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/sprinto-partnership</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/storybooks-websockets-attack</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/supabase-approach-to-secure-by-default-development</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/supply-chain-attack-on-react-native-aria-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/supply-chain-security-sca-tools-guide</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/teampcp-deploys-worm-npm-trivy-compromise</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/teampcp-stage-payload-canisterworm-iran</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/telnyx-pypi-compromised-teampcp-canisterworm</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/the-cure-for-security-alert-fatigue-syndrome</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/the-future-of-pentesting-is-autonomous</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/the-malware-dating-guide-understanding-the-types-of-malware-on-npm</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/the-start-ups-open-source-guide-to-application-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/the-top-7-threat-intelligence-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/token-efficiency-secrets-scan</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-6-continuous-pentesting-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-7-aspm-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-ai-code-generators</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-ai-coding-assistants</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-ai-coding-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-ai-security-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-api-scanners</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-automated-penetration-testing-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-aws-security-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-azure-security-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-cloud-application-security-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-cloud-native-application-protection-platforms-cnapp</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-cloud-security-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-cve-scanners-in-2026-to-identify-known-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-docker-security-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-gcp-security-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-iast-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-infrastructure-as-a-code-iac-scanners</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-javascript-security-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-kubernetes-security-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-runtime-security-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-secret-scanning-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-security-monitoring-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-software-security-testing-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-software-supply-chain-security-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-surface-monitoring-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-tools-to-detect-malware-in-dependencies</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-vibe-coding-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-virtual-machine-security-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-vs-code-extensions</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-vulnerability-management-tools</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/top-wiz-io-alternatives-for-cloud-application-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/trag-is-now-part-of-aikido-secure-code-at-ai-speed</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/trump-cybersecurity-strategy-2026</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/uk-cybersecurity-resilience-bill-compliance</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/ultimate-sast-guide-static-application-security-testing</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/understanding-sbom-standards-a-look-at-cyclonedx-spdx-and-swid</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/veracode-vs-checkmarx-vs-fortify</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/vismas-security-boost-with-aikido-a-conversation-with-nikolai-brogaard</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/waf-rasp-adr</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/we-got-lucky-the-supply-chain-disaster-that-almost-happened</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/we-just-raised-our-17-million-series-a</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/web-application-security-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/web-rest-api-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/webhook-security-checklist</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/what-is-a-cve</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/what-is-code-quality</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/what-is-continuous-pentesting</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/what-is-cspm-cnapp-cloud-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/what-is-owasp-top-10</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/why-determinism-is-necessary</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/why-trying-to-secure-openclaw-is-ridiculous</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/why-updating-container-base-images-is-so-hard-and-how-to-make-it-easier</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/why-were-stoked-to-partner-with-laravel</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/xrp-supplychain-attack-official-npm-package-infected-with-crypto-stealing-backdoor</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/xss-vulnerabilities-in-mailcow</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/your-client-requires-nis2-vulnerability-patching-now-what</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/youre-invited-delivering-malware-via-google-calendar-invites-and-puas</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/zen-stops-idor-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/blog/zero-day-nodejs</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/bart-jonckheere</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/berg</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/charlie-eriksen</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/dania-durnas</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/dimitris-mostrous</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/divine-odazie</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/felix-garriau</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/hans-ott</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/ilyas-makari</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/jarno-goossens</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/joe-leon</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/joel-hans</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/johan-de-keulenaer</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/jorian-woltjer</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/louis</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/mackenzie-jackson</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/madeline-lawrence</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/michiel-denis</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/mike-wilkes</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/nicholas-thomson</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/raphael-silva</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/rein-daelman</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/rez-moss</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/robbe-verwilghen</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/ruben</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/sooraj-shah</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/tarak</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/the-aikido-team</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/thomas-segura</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/timo</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/trusha-sharma</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/team-members/zach-rice</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/category/aikido</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/category/compliance</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/category/customer-stories</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/category/devsec-tools-comparisons</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/category/engineering</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/category/guides</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/category/guides-best-practices</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/category/news</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/category/product-company-updates</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/category/technical</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/category/vulnerabilities-threats</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/aicpa-soc-2</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/ci-cd-pipeline-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/cloud-misconfiguration</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/cloud-posture-management</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/common-vulnerabilities-and-exposures-cve</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/container-scanning</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/dynamic-application-security-testing-dast</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/false-positives</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/infrastructure-as-code-iac-scanning</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/iso-27001-2022</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/open-source-audits</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/open-source-dependencies</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/open-source-license-management</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/open-source-license-scanning</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/open-source-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/owasp-top-10</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/pentesting-ptaas</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/sast-dast</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/secrets-detection</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/software-bill-of-materials-sbom</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/software-composition-analysis-sca</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/software-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/source-code-secrets-detection</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/sql-injection</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/static-application-security-testing-sast</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/static-code-analysis</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/technical-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/glossary/xss-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/apheris</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/athumi</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/autostore</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/balena</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/birdie</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/bound</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/certifid</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/coniq</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/core</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/cube-labs</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/faspay</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/gea</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/go-autonomous</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/gravity</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/helin</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/hiringbranch</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/human-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/invitedesk</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/jurimesh</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/kunlabora</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/marvelution</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/mediquest</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/midaxo</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/n8n</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/nerdio</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/november-five</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/outboundsync</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/oviva</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/pathful</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/petrosea</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/prove</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/psg</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/render</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/runna</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/secwise</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/serko</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/sgnl</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/simployer</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/smartendr</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/sunhat</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/supermetrics</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/techdivision</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/techwolf</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/tellent-recruitee</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/timefold</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/customer-story/visma</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/devsecops/software-security-tools/api-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/devsecops/software-security-tools/appsec-tools-implementation</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/devsecops/software-security-tools/aspm-application-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/devsecops/software-security-tools/cicd-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/devsecops/software-security-tools/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/devsecops/software-security-tools/cspm-cloud-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/devsecops/software-security-tools/dast-dynamic-application-security-testing</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/devsecops/software-security-tools/dependency-scanners</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/devsecops/software-security-tools/devsecops-buzzwords</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/devsecops/software-security-tools/devsecops-summary</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/devsecops/software-security-tools/infrastructure-as-code-iac-scanners</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/devsecops/software-security-tools/license-scanning</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/devsecops/software-security-tools/malware-detection</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/devsecops/software-security-tools/sbom-software-bill-of-materials</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/devsecops/software-security-tools/secrets-detection</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/devsecops/software-security-tools/waf-web-application-firewalls</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/audit-prep</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/choosing-frameworks</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/cmmc</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/common-controls</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/compliance-devsecops</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/compliance-training</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/compliant-pipelines</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/conclusion</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/cra-eu</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/dora-compliance</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/essential-eight</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/fedramp</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/gdpr-compliance</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/hipaa-hitech</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/iso-27017-27018</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/japan-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/maintaining-compliance</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/nis2</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/nist-800-53</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/nist-ssdf</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/owasp-asvs</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/pci-dss</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/singapore-ccop</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/soc-2</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/compliance/compliance-frameworks/what-is-compliance</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/secure-development-practices/secure-development/code-build-secure-code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/secure-development-practices/secure-development/developer-security-training</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/secure-development-practices/secure-development/iterative-improvement-secure-development</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/secure-development-practices/secure-development/plan-design-secure-code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/secure-development-practices/secure-development/secure-dev-culture</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/secure-development-practices/secure-development/secure-development-enabler</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/secure-development-practices/secure-development/secure-development-faq</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/secure-development-practices/secure-development/secure-development-metrics</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/secure-development-practices/secure-development/secure-development-motivations-hurdles</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/secure-development-practices/secure-development/secure-development-ownership</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/secure-development-practices/secure-development/secure-sdlc</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/learn/secure-development-practices/secure-development/test-verify-find-bugs</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/10-code-quality-rules-learned-from-grafanas-engineering-team</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/20-code-review-rules-for-scalable-development</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/avoid-assignments-in-conditionals-preventing-hidden-bugs</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/avoid-deep-nesting-levels-writing-maintainable-code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/detect-potential-injection-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/detect-potentially-malicious-code-patterns-identifying-hidden-threats-in-your-codebase</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/eliminate-obvious-within-file-duplication-reducing-technical-debt</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/freecodecamp-code-quality-insights-rules-that-can-improve-any-codebase</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/guard-against-slow-regular-expressions-preventing-redos-attacks</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/handle-errors-in-catch-blocks-why-empty-catch-blocks-break-production-systems</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/how-to-add-explanatory-comments-to-functions-for-safer-and-more-maintainable-code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/how-to-avoid-breaking-public-api-contracts-maintaining-backward-compatibility</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/how-to-avoid-select-in-sql-preventing-data-leaks</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/how-to-detect-and-fix-contradictory-logic-in-your-code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/how-to-favor-composition-over-inheritance-for-maintainable-and-flexible-code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/how-to-fix-php-autoload-errors-matching-class-names-to-filenames</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/how-to-identify-and-remove-unreachable-dead-code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/how-to-identify-and-remove-unreachable-dead-code-2</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/how-to-keep-functions-concise-writing-maintainable-code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/how-to-prevent-race-conditions-thread-safe-access-to-shared-state</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/how-to-remove-lingering-todo-and-fixme-comments-from-your-codebase</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/how-to-split-large-code-files-organizing-code-for-maintainability</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/how-to-write-comments-that-explain-intent-instead-of-restating-code-mechanics</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/nasa-10-coding-rules-for-safety-critical-code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/prevent-hardcoded-secrets-in-python</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/prevent-segmentation-faults-memory-safety-in-c-and-c-plus-plus</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/release-locks-even-on-exception-paths-preventing-deadlocks</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/remove-debugging-and-temporary-code-before-commits-a-security-and-performance-guide</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/stop-using-md5-and-sha-1-modern-hashing-for-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-avoid-break-in-loop-iterations-better-code-patterns</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-avoid-redundant-database-indexes-optimizing-storage-and-write-performance</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-avoid-use-of-goto-in-code-for-maintainability-and-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-classes-should-follow-the-single-responsibility-principle</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-global-variables-cause-data-leaks-in-node-js-servers</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-keep-code-lines-at-a-readable-length-in-code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-you-should-avoid-dynamic-variable-names-in-php</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-you-should-avoid-overusing-undocumented-anonymous-functions-in-your-code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-you-should-avoid-recursion-without-depth-protection</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-you-should-check-the-divisor-before-performing-division-operations</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-you-should-make-a-functions-purpose-self-evident-for-clearer-code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-you-should-remove-commented-out-code-from-your-codebase</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-you-should-use-descriptive-variable-names-to-write-self-documenting-code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-you-should-use-early-returns-and-guard-clauses-for-cleaner-more-readable-code</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-you-should-use-named-arguments-in-python-and-php</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-you-should-use-one-class-per-file-improving-code-organization-and-navigation</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-you-should-use-safe-patterns-when-removing-items-from-collections</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-you-should-wrap-array-filter-with-array-values-in-php</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/code-quality/rules/why-you-shouldnt-override-function-arguments-preventing-confusion-and-debugging-issues</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/book/demo</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/book/learn-how-ai-pentest-work</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/book/pentest-demo</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/reports/2026-frost-sullivan-customer-value-leadership-recognition</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/reports/2026-state-of-ai-in-security-development</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/reports/autonomous-vs-manual-pentesting-benchmark</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/reports/ciso-vibe-coding-checklist-for-security</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/reports/saas-cto-security-checklist</loc>
    </url>
    <url>
        <loc>https://www.aikido.dev/snake-products/snake-eau-de-parfum</loc>
    </url>
</urlset>