<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://modelcontextprotocol-security.io/ttps/ai-specific-vulnerabilities/adversarial-attacks/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/prompt-injection/ansi-escape-injection/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operations/api-gateway-operations.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/data-exfiltration/api-key-exposure/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/economic-infrastructure-abuse/api-rate-limit-bypass/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/build/architecture-patterns/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/authentication/audit-bypass/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/authentication/auth-bypass-rogue-server/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/build/authentication-strategies/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/authentication/authorization-bypass/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/hardening/backup-versioning.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/monitoring-operational-security/blind-spots-in-security/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/authentication/broken-authentication/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operations/change-management.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/community/charter.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/hardening/checklist.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/top10/client/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/command-injection/code-injection/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/hardening/code-integrity-auditing.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/community/code-of-conduct.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/command-injection/command-injection/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/economic-infrastructure-abuse/computational-resource-abuse/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operations/container-operations.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/context-manipulation/context-manipulation/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/context-manipulation/context-poisoning/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/prompt-injection/context-shadowing/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/context-manipulation/context-spoofing/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/data-exfiltration/conversation-history-exfiltration/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/context-manipulation/covert-channel-abuse/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/data-exfiltration/credential-exfiltration/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/privilege-access-control/cross-context-access/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/known-vulnerabilities/cve-2025-49596/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/known-vulnerabilities/cve-2025-6514/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/data-exfiltration/data-exfiltration/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/supply-chain/dependency-vulnerabilities/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/prompt-injection/direct-prompt-injection/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/supply-chain/drift-from-upstream/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/patterns/enterprise-gateway.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/privilege-access-control/excessive-tool-permissions/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/why/faq.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operations/forensics-investigation.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/get-involved.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/prompt-injection/hidden-instructions/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/authentication/identity-subversion/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/monitoring-operational-security/inadequate-monitoring/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operations/incident-response.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/top10/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/why/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/events/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/community/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/patterns/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/monitoring-operational-security/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/economic-infrastructure-abuse/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/prompt-injection/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/privilege-access-control/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/authentication/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/context-manipulation/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/supply-chain/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/ai-specific-vulnerabilities/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/command-injection/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/protocol-vulnerabilities/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/tool-poisoning/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/data-exfiltration/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operational/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/hardening/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/tools/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/news/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/audit/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/blog/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/build/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/vulnerability-db/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operations/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/known-vulnerabilities/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/prompt-injection/indirect-prompt-injection/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/ai-specific-vulnerabilities/inference-attacks/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/protocol-vulnerabilities/insecure-communication/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/supply-chain/installer-spoofing/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/monitoring-operational-security/insufficient-logging/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/protocol-vulnerabilities/lack-of-authentication-standards/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/hardening/lifecycle-management.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/patterns/llm-heaven-vps.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/patterns/local-dev-container.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/monitoring-operational-security/log-tampering/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/supply-chain/malicious-dependency-inclusion/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/supply-chain/malicious-mcp-packages/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/command-injection/malicious-output-composition/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/audit/mcp-inspector.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/context-manipulation/memory-references-issues/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/tool-poisoning/metadata-manipulation-attacks/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/tool-poisoning/metadata-manipulation/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/tool-poisoning/metadata-prompt-injection/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/monitoring-operational-security/missing-audit-trails/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/protocol-vulnerabilities/missing-integrity-controls/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/ai-specific-vulnerabilities/model-poisoning/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/ai-specific-vulnerabilities/model-theft/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operations/monitoring-alerting.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operations/network-controls.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/build/oauth-security/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/hardening/observability-logging.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operations/operational-maintenance.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operations/operational-runbooks.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/command-injection/os-command-injection/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/command-injection/output-prompt-injection/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/hardening/payments-wallets.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operations/performance-security.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/hardening/policy-guardrails.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/tool-poisoning/preference-manipulation/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/authentication/privilege-escalation/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/privilege-access-control/process-injection/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/projects/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/prompt-injection/prompt-state-manipulation/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/protocol-vulnerabilities/protocol-implementation-flaws/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/hardening/provenance-selection.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operational/registry-security/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operations/remote-deployment.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/privilege-access-control/resource-access-control-bypass/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/economic-infrastructure-abuse/resource-exhaustion/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/hardening/runtime-isolation.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/build/runtime-isolation/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operational/runtime-monitoring/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/privilege-access-control/sandbox-escape/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/audit/scorecard.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/hardening/secrets-management.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operations/security-troubleshooting.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operations/security-workflows.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/data-exfiltration/sensitive-information-disclosure/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/top10/server/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/protocol-vulnerabilities/session-ids-in-urls/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/authentication/session-management-issues/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/command-injection/shell-command-execution/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/command-injection/sql-injection/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/audit/step-by-step-guide.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/supply-chain/supply-chain-attacks/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operations/tls-proxy-management.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/data-exfiltration/token-theft/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/prompt-injection/tool-description-poisoning/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/tool-poisoning/tool-impersonation/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/build/tool-metadata-spec/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/tool-poisoning/tool-mutation/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/tool-poisoning/tool-name-conflict/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/tool-poisoning/tool-poisoning/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/tool-poisoning/tool-shadowing/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/tool-poisoning/tool-squatting/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/audit/tool-usage-auditing/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/hardening/traffic-mediation.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operations/traffic-redirection.html</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps-view/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/supply-chain/typosquatting/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/authentication/unauthenticated-access/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/ttps/privilege-access-control/unauthorized-privilege-escalation/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/operational/version-management/</loc>
</url>
<url>
<loc>https://modelcontextprotocol-security.io/audit/vulnerability-tracking/</loc>
</url>
</urlset>
