<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
<url><loc>https://airtasystems.com/academy</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url>
<url><loc>https://airtasystems.com/about-airtasystems</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url>
<url><loc>https://airtasystems.com/ai-application-security</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/ai-product-market-access</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url>
<url><loc>https://airtasystems.com/ai-product-litigation-defence</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url>
<url><loc>https://airtasystems.com/ai-product-risk-management</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url>
<url><loc>https://airtasystems.com/ai-product-consumer-duty</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url>
<url><loc>https://airtasystems.com/ai-product-safety</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url>
<url><loc>https://airtasystems.com/ai-safety-policy</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/ai-safety-testers</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/ai-safety-testing-programs</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/ai-safety-testing-teams</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/ai-safety-incident-response</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/ai-safety-testing</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/ai-safety-hub</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url>
<url><loc>https://airtasystems.com/ailp</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url>
<url><loc>https://airtasystems.com/airta</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url>
<url><loc>https://airtasystems.com/arrange-demo</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/contact</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/cookie-policy</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url>
<url><loc>https://airtasystems.com/investors</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>1</priority></url>
<url><loc>https://airtasystems.com/gdpr-compliance</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
<url><loc>https://airtasystems.com/code-of-conduct</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url>
<url><loc>https://airtasystems.com/privacy-policy</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url>
<url><loc>https://airtasystems.com/post-market-monitoring-ai-act</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/research</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/support</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/whitepapers</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/terms-of-use</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url>
<url><loc>https://airtasystems.com/ai-safety-alignment-resources</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/ai-safety-alignment-resources/ai-safety-faq</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/ai-safety-alignment-resources/ai-safety-glossary</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/whitepapers/who-needs-ai-product-safety</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/whitepapers/ai-product-safety-for-startups</loc><lastmod>2026-04-20T07:34:25.655Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/get-started</loc><lastmod>2026-04-20T07:34:25.822Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts</loc><lastmod>2026-04-20T07:34:25.822Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/academy/ai-controls</loc><lastmod>2026-04-20T07:34:25.822Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/academy/ai-security-frameworks</loc><lastmod>2026-04-20T07:34:25.822Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/academy/offensive-ai-safety-testing</loc><lastmod>2026-04-20T07:34:25.822Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/academy/owasp-top-10-llms</loc><lastmod>2026-04-20T07:34:25.822Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks</loc><lastmod>2026-04-20T07:34:25.822Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks</loc><lastmod>2026-04-20T07:34:25.822Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks</loc><lastmod>2026-04-20T07:34:25.822Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks</loc><lastmod>2026-04-20T07:34:25.822Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks</loc><lastmod>2026-04-20T07:34:25.822Z</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url>
<url><loc>https://airtasystems.com/academy/get-started/ai-safety-testing-101</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/get-started/how-to-build-reputation-ai-safety</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/get-started/how-invitations-and-team-access-work</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/get-started/understanding-program-safety-tiers</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/get-started/risk-categories</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/get-started/safe-harbour-on-airtasystems</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/get-started/black-box-testing</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/trust-gap-rag-prioritizes-internal-data</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/rag-demonstration-meeting-notes-injection</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/poisoned-database-record-sql-structured-data</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/persistence-of-threats-multi-user-simulation</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/unsanitized-data-sources-trojan-horse</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/parsing-vulnerabilities-invisible-ink</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/semantic-search-manipulation</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/context-window-exploitation</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/ranking-algorithm-abuse-seo</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/direct-vs-indirect-injection</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/ephemeral-vs-persistent-compromise</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/manipulation-vs-extraction</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/source-vulnerabilities-unchecked-write</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/semantic-corruption-vandalism-vs-poisoning</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/ingestion-lag-ghost-in-the-machine</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/metadata-injection-hidden-label</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/invisible-text-white-on-white</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/structure-abuse-alt-text-trojan</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/defining-triggers-semantic-landmine</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/conditional-injection-if-then-logic</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/dormant-vs-active-state-time-bomb</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/split-payload-injection-jigsaw-puzzle</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/homoglyph-attacks-visual-twins</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/semantic-camouflage-needle-in-haystack</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/keyword-stuffing-for-embeddings-seo-spam</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/overriding-authority-specificity-bias</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/fact-collision-assertiveness-hijack</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/vector-space-mapping-target-coordinates</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/distance-metrics-mathematical-mimicry</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/nearest-neighbor-fallacy-false-peer</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/semantic-collisions-doppelganger</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/boundary-hopping-fence-jumper</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/optimization-attacks-lockpicker</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/creating-attractors-black-hole</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/index-pollution-top-k-flood</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/metadata-coupling-identity-theft</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/inverse-semantic-optimization-invisible-ink</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/orphaned-vectors-dead-drop</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/drift-induction-ghost-versions-past</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/relevance-dilution-signal-jammer</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/cluster-flattening-bridge-builder</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/latency-induction-algorithmic-quicksand</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/model-inversion-fingerprint</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/gradient-based-vector-attacks-magic-word</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/cross-modal-implications-visual-backdoor</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/trust-boundary-blind-spot</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/context-promotion-authority-override</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/user-fallacy-virtual-ventriloquist</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/prompt-overrides-fake-admin</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/stop-sequences-conversation-hijack</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/formatting-hacks-markdown-spoof</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/perimeter-evasion-inside-job</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/internal-trust-verification-unchecked-luggage</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/sanitization-gaps-encoded-payload</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/instruction-drift-intent-overwrite</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/tool-coercion-confused-deputy</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/output-redirection-markdown-exfiltration</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/split-context-injection-binary-weapon</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/recursive-retrieval-chain-reaction</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/context-stuffing-compliance-fatigue</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/rce-via-agents-code-bomb</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/data-exfiltration-blind-leech</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/denial-of-service-infinite-loop</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/top-k-bottleneck-king-of-the-hill</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/dense-vs-sparse-hybrid-exploit</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/reranking-step-judge-jury-executioner</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/probe-query-analysis-metric-detective</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/identifying-hybrid-weighting-alpha-leak</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/metadata-leakage-tech-stack-fingerprint</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/keyword-stuffing-2-authority-hijack</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/semantic-density-optimization-vector-concentrate</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/metadata-dominance-freshness-exploit</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/adversarial-passages-gibberish-trigger</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/latency-induction-computational-sponge</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/false-positive-injection-confidence-bias</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/exact-match-forcing-anchor-hook</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/boundary-manipulation-padding-attack</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/context-displacement-eviction-notice</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/sybil-attacks-clone-army</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/relevance-dilution-empty-calories</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/safety-rule-displacement-distance-decay</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/blind-probing-sonar-ping</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/semantic-triangulation-shadow-boxing</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/feedback-loop-vector-walker</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/keyword-anchoring-harpoon</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/metadata-guessing-filter-bypass</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/needle-extraction-copy-paste-trick</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/authority-conflict-new-boss</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/formatting-mimicry-uniform-trick</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/prompt-injection-via-proxy-remote-detonation</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/gradient-based-queries-hotflip-demo</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/token-manipulation-weird-tokens-demo</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/cross-lingual-bypass-german-query-demo</loc><lastmod>2026-04-20T07:34:25.888Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/context-overflow-memory-wipe</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/safety-rule-displacement-attention-decay</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/recency-bias-exploitation-last-word</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/automated-mapping-cartographer</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/blind-extraction-scripts-recursive-crawler</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/evasion-semantic-audits-jitter-drift</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/probabilistic-vs-deterministic-guessing</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/react-loop-hijack</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/dependency-cascade-failure</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/thought-interruption-injection</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/cot-logic-loop</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/context-truncation-override</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/assume-success-attack</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/step-skipping-under-sla-pressure</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/fake-internal-dialogue</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/false-dilemma-framing</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/appeal-to-authority-override</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/harmful-content-bypass</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/jailbreak-via-roleplay</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/slippery-slope-escalation</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/tool-hallucination-pressure</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/faked-capabilities-override</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/phantom-data-assumptions</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/goal-hijacking-override</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/definition-swapping</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/obfuscated-harmful-request</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/premature-termination</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/o-t-a-cycle-trap</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/observation-injection-pause-point</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/control-flow-redirect</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/return-value-spoofing</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/error-message-manipulation</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/observation-stuffing</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/priority-override-alert</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/trojan-horse-task</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/recursive-logic-trap</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/unresolvable-error-loop</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/resource-exhaustion-pagination</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/fake-approval-signal</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/social-engineering-hitl</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/channel-spoofing</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/variable-pollution</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/self-reflective-poisoning</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/session-locking</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/privilege-mismatch-confused-deputy</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/identity-spoofing-in-audit-logs</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/authorization-bypass-repo-access</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/sql-injection-via-natural-language</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/ssrf-metadata-fetch</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/command-injection-via-tool-arguments</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/environment-variable-exfiltration</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/reverse-shell-execution</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/resource-denial-of-service</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/path-traversal-file-read</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/destructive-file-overwrite</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/file-system-data-exfiltration</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/search-and-send-chain</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/reconnaissance-chaining</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/logic-bridging-chain</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/schema-hallucination</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/type-confusion-payload</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/obfuscation-bypass</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/decoupling-authn-from-authz</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/implicit-trust-assumptions</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/intent-obfuscation</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/justification-fabrication</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/logic-puzzle-encapsulation</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/idor-via-natural-language</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/rag-metadata-exploitation</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/shared-context-leak</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/tool-argument-injection</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/hallucinated-admin-tool</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/chaining-unprivileged-tools</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/recursive-file-generation</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/api-rate-limit-triggering</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/deep-recursion-traversal</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/trust-mesh</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/handoff-vulnerability</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/handoff-vulnerability-covert</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/orchestrator-attack</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/message-injection</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/protocol-jamming</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/context-stripping</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/blackboard-poisoning</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/variable-overwriting</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/race-condition</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/authority-spoofing</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/recursive-jailbreaking</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/trojan-horse-handoff</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/deadlock-injection</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/fail-open-exploitation</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/error-propagation</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/router-misdirection</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/task-spoofing</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/gatekeeper-bypass</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/topology-lifecycle-enforcement</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/client-handshake-fuzzing</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/tool-schema-security-analysis</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/implicit-trust-reflected-injection</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/host-authorization-path-traversal</loc><lastmod>2026-04-20T07:34:25.940Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/user-intent-fallacy-confused-deputy</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/parameter-injection-and-overflow</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/request-flooding-dos-resilience</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/error-object-reconnaissance</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/stdio-sniffing-credential-exposure</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/token-leakage-in-json-payloads</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/message-correlation-thread-reconstruction</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/sampling-ui-spoofing</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/invisible-payload-execution</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/scope-escalation-dotfile-access</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/protocol-version-downgrade</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/resource-uri-scheme-fuzzing-ssrf</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/encapsulated-command-injection</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/uri-schema-validation</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/read-request-cycle-analysis</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/mime-type-confusion</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/path-traversal-dot-dot-slash</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/path-traversal-url-encoding-evasion</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/path-traversal-absolute-path-injection</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/custom-uri-scheme-confusion</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/uri-authority-injection</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/protocol-wrapping-and-nested-schemes</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/template-greedy-regex-exploitation</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/template-variable-traversal-injection</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/template-sanitization-bypass</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/resource-subscriptions-protocol-attack</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/high-frequency-request-flood-attack</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/payload-inflation-attack</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/symlink-access-control-bypass</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/toctou-race-condition-exploitation</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/path-canonicalization-bypass</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/tool-schema-definition-and-enforcement</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/payload-mapping-and-argument-injection</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/tool-error-object-reconnaissance</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/command-injection-shell-metacharacter-breakout</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/command-injection-argument-flag-injection</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/command-injection-polyglot-and-evasion-payloads</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/sql-injection-classic-and-union-based</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/nosql-injection-object-and-operator-injection</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/database-reconnaissance-error-based-fingerprinting</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/hidden-tool-discovery-shadow-apis</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/scope-creep-arbitrary-file-read</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/forced-invocation-rbac-bypass</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/state-corruption-file-overwrite</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/resource-exhaustion-algorithmic-dos</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/blind-side-effect-verification</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/validation-bypass-encoding-and-unicode-obfuscation</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/validation-bypass-json-duplicate-key-injection</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/validation-bypass-regex-newline-injection</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/handshake-initialization-payload-fuzzing</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/handshake-capability-negotiation-impact</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/handshake-protocol-version-enforcement</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/the-blindfold-logging-omission</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/sampling-capability-downgrade</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/protocol-version-downgrade</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/dos-batch-request-amplification</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/dos-json-parser-recursion-bomb</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/state-management-request-replay</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/state-management-workflow-bypass-idor</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/transport-config-reconnaissance</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/transport-payload-size-and-buffer-stress</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/transport-stream-framing-newline-injection</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/transport-stdio-command-smuggling</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/transport-stdio-buffer-flood-dos</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/transport-stderr-and-error-leakage</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/transport-cors-misconfiguration</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/transport-unauthenticated-message-injection</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/transport-cleartext-check</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/mitm-stdio-wrapper-modification</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/mitm-http-proxy-trust</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/mitm-transport-layer-exposure</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/mitm-error-suppression</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/mitm-phantom-write-action-spoofing</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/mcp-attacks/mitm-data-falsification</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/hierarchy-of-leakage-inference-extraction</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/attack-surface-analysis-white-box-vs-black-box</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/model-imitation-teacher-student-attack</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/data-extraction-model-inversion</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/membership-signal-overfitting-analysis</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/metrics-and-thresholds-mathematics-of-surprise</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/enhanced-detection-lira-and-reference-models</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/canary-extraction-and-k-eidetic-memorization</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/prefix-attacks-and-document-completion</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/the-myth-of-one-way-embeddings</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/embedding-inversion-vec2text-attack</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/rag-compromise-vector-dump-forensics</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/attribute-inference-stylometry-attack</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/gradient-leakage-deep-leakage-from-gradients</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/regurgitation-phenomenon-grandma-exploit</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/divergence-attacks-repetition-trigger</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/cloze-completion-prefix-and-decoding-attacks</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/memorization-mapping-code-vs-prose</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/social-engineering-jailbreaking-for-extraction</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/knowledge-distillation-the-heist</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/synthetic-dataset-generation-self-instruct</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/knockoff-nets-training-logic-and-loss-functions</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/watermarking-mechanics-green-list-and-red-list</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/watermark-evasion</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/stealing-business-logic-beyond-language</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/decision-boundary-mapping</loc><lastmod>2026-04-20T07:34:25.975Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/hyperparameter-extraction</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/advanced-system-prompt-inversion-surrogate-inversion</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/substitute-model-training-model-stealing</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/offline-adversarial-optimization</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/get-started/dvaia-damn-vulnerable-ai-application</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/beyond-ignore-previous-instructions</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/multishot-chain-of-thought-injection</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/persona-adoption-attacks</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/context-manipulation-window-overflow</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/token-based-exploits-obfuscation</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/mapping-guardrail-triggers</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/technical-obfuscation-encoding</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/multilingual-low-resource-gap</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/competing-objectives-yes-ladder</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/universal-adversarial-strings-suffix</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/fragility-of-soft-logic</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/instruction-hierarchy-attacks</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/advanced-jailbreaks-dan-logic</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/advanced-jailbreaks-framing-context</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/exfiltrating-sensitive-system-data</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/prompt-extraction-techniques</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/hunting-hardcoded-secrets</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/rag-context-leakage</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/model-attacks/model-inversion-training-data</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/polyglot-file-rag-byte-injection</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/ocr-injection-resume-hack</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/rag-attacks/clickable-hallucination-malicious-link</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/agent-attacks/audio-to-execution-kill-chain</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/owasp-top-10-llms/llm10-Unbounded-consumption</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/owasp-top-10-llms/llm09-misinformation</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/owasp-top-10-llms/llm08-vector-and-embedding-weaknesses</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/owasp-top-10-llms/llm07-system-prompt-leakage</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/owasp-top-10-llms/llm06-excessive-agency</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/owasp-top-10-llms/llm05-improper-utput-andling</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/owasp-top-10-llms/llm04-data-and-model-poisoning</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/owasp-top-10-llms/llm03-supply-chain-vulnerabilities</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/owasp-top-10-llms/llm02-sensitive-information-disclosure</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/owasp-top-10-llms/llm01-prompt-injection</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/offensive-ai-safety-testing/reporting-and-remediation</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/model-validation</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/reinforcement-learning</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/supervised-learning</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/unsupervised-learning</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/system-prompts</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/system-roles</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/user-prompts</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/zero-shot-prompting</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/multi-shot-prompting</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/templates</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/offensive-ai-safety-testing/data-leakage-privacy</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/fine-tuning</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/offensive-ai-safety-testing/excessive-agency-tool-abuse</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/artificial-intelligence-ai</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/machine-learning-ml</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/deep-learning</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/generative-ai</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/natural-language-processing-nlp</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/statistical-learning</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/basic-ai-concepts/transformers</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/offensive-ai-safety-testing/indirect-prompt-injection</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/offensive-ai-safety-testing/prompt-injection-jailbreaking</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/get-started/write-a-clear-safety-report</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/offensive-ai-safety-testing/ai-reconnaissance-mapping</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/ai-controls/coming-soon</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/ai-security-frameworks/coming-soon</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/offensive-ai-safety-testing/ai-safety-stack-frameworks</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/get-started/dont-cause-harm</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/probabilistic-vulnerabilities</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/anatomy-llm-attack-surface</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/academy/adversarial-attacks/indirect-entry-points</loc><lastmod>2026-04-20T07:34:26.015Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/support/get-started</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/support/api-documentation</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.7</priority></url>
<url><loc>https://airtasystems.com/support/api-documentation/bulk-import-api-imported-reports</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
<url><loc>https://airtasystems.com/support/get-started/about-airtasystems-platform</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
<url><loc>https://airtasystems.com/support/get-started/getting-started-program-setup</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
<url><loc>https://airtasystems.com/support/get-started/program-management-operations</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
<url><loc>https://airtasystems.com/support/get-started/ai-safety-research-teams-testing</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
<url><loc>https://airtasystems.com/support/get-started/report-management-response</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
<url><loc>https://airtasystems.com/support/get-started/compliance-eu-ai-act</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
<url><loc>https://airtasystems.com/support/get-started/ongoing-operations-optimization</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
<url><loc>https://airtasystems.com/support/api-documentation/api-keys-overview-getting-started</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
<url><loc>https://airtasystems.com/support/api-documentation/creating-managing-api-keys</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
<url><loc>https://airtasystems.com/support/api-documentation/authentication-scopes</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
<url><loc>https://airtasystems.com/support/api-documentation/read-only-endpoints-reference</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
<url><loc>https://airtasystems.com/support/api-documentation/error-handling-troubleshooting</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
<url><loc>https://airtasystems.com/support/api-documentation/best-practices-security</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
<url><loc>https://airtasystems.com/support/api-documentation/python-integration-examples</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
<url><loc>https://airtasystems.com/support/api-documentation/javascript-integration-examples</loc><lastmod>2026-04-20T07:34:26.067Z</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url>
</urlset>