<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//blog.turen.io/sitemap.xsl"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://blog.turen.io/generation-time-sast-is-what-ai-native-security-looks-like/</loc><lastmod>2026-04-06T17:00:02.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/b2/64/b2640d16-966b-406a-8332-e474bcbba08e/content/images/2026/04/zoo.png</image:loc><image:caption>zoo.png</image:caption></image:image></url><url><loc>https://blog.turen.io/introducing-vigil-open-threat-intelligence-for-ai-agent-skills/</loc><lastmod>2026-04-03T14:02:54.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/b2/64/b2640d16-966b-406a-8332-e474bcbba08e/content/images/2026/04/vigil.png</image:loc><image:caption>vigil.png</image:caption></image:image></url><url><loc>https://blog.turen.io/harness-engineering-is-where-teams-win/</loc><lastmod>2026-03-27T16:19:44.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/b2/64/b2640d16-966b-406a-8332-e474bcbba08e/content/images/2026/03/cat.png</image:loc><image:caption>cat.png</image:caption></image:image></url><url><loc>https://blog.turen.io/building-a-self-improving-malware-classifier-with-claude/</loc><lastmod>2026-03-06T15:48:05.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/b2/64/b2640d16-966b-406a-8332-e474bcbba08e/content/images/2026/03/sandstrike.png</image:loc><image:caption>sandstrike.png</image:caption></image:image></url><url><loc>https://blog.turen.io/ai-agents-and-the-rise-of-the-software-factory/</loc><lastmod>2026-03-06T15:47:59.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/b2/64/b2640d16-966b-406a-8332-e474bcbba08e/content/images/2026/02/factory.png</image:loc><image:caption>factory.png</image:caption></image:image></url><url><loc>https://blog.turen.io/building-replicate/</loc><lastmod>2026-03-06T15:47:43.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/b2/64/b2640d16-966b-406a-8332-e474bcbba08e/content/images/2026/02/Screenshot-2026-02-20-at-9.18.40---AM.png</image:loc><image:caption>Screenshot-2026-02-20-at-9.18.40---AM.png</image:caption></image:image></url><url><loc>https://blog.turen.io/batou-generation-time-sast-for-claude-code-runtime-security-while-the-ai-is-typing/</loc><lastmod>2026-03-06T15:47:17.000Z</lastmod><image:image><image:loc>https://storage.ghost.io/c/b2/64/b2640d16-966b-406a-8332-e474bcbba08e/content/images/2026/02/logo_2-1.png</image:loc><image:caption>logo_2-1.png</image:caption></image:image></url><url><loc>https://blog.turen.io/coming-soon/</loc><lastmod>2026-02-06T19:57:11.000Z</lastmod><image:image><image:loc>https://static.ghost.org/v4.0.0/images/feature-image.jpg</image:loc><image:caption>feature-image.jpg</image:caption></image:image></url></urlset>