<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://www.codethreat.com/</loc></url>
<url><loc>https://www.codethreat.com/404</loc></url>
<url><loc>https://www.codethreat.com/terms-of-services</loc></url>
<url><loc>https://www.codethreat.com/privacy-policy</loc></url>
<url><loc>https://www.codethreat.com/blogs</loc></url>
<url><loc>https://www.codethreat.com/contact-us</loc></url>
<url><loc>https://www.codethreat.com/book-a-demo</loc></url>
<url><loc>https://www.codethreat.com/pricing</loc></url>
<url><loc>https://www.codethreat.com/about</loc></url>
<url><loc>https://www.codethreat.com/features/sast</loc></url>
<url><loc>https://www.codethreat.com/features/sca</loc></url>
<url><loc>https://www.codethreat.com/features/iac</loc></url>
<url><loc>https://www.codethreat.com/features/secrets</loc></url>
<url><loc>https://www.codethreat.com/features/false-positive-elimination</loc></url>
<url><loc>https://www.codethreat.com/features/code-review</loc></url>
<url><loc>https://www.codethreat.com/features/pull-request-review</loc></url>
<url><loc>https://www.codethreat.com/features/repo-summarization</loc></url>
<url><loc>https://www.codethreat.com/career</loc></url>
<url><loc>https://www.codethreat.com/blogs/agent-component-security-index</loc></url>
<url><loc>https://www.codethreat.com/blogs/benchmarking-codethreat%E2%80%99s-contextual-ai-sast-engine</loc></url>
<url><loc>https://www.codethreat.com/blogs/hallucinative-insecure-gpt-code-generation</loc></url>
<url><loc>https://www.codethreat.com/blogs/catch-malicious-behavior-in-your-code-early</loc></url>
<url><loc>https://www.codethreat.com/blogs/securing-redis-clients-common-pitfalls-best-practices</loc></url>
<url><loc>https://www.codethreat.com/blogs/shifting-security-leftest-make-devs-security-first</loc></url>
<url><loc>https://www.codethreat.com/blogs/owasp-benchmark-how-useful-is-it-for-sast</loc></url>
<url><loc>https://www.codethreat.com/blogs/least-privilege-in-spel-lessons-from-cve-2022-22963</loc></url>
<url><loc>https://www.codethreat.com/blogs/spring4shell-what-it-is-how-to-dodge-it</loc></url>
<url><loc>https://www.codethreat.com/blogs/think-like-a-hacker-code-like-a-pro</loc></url>
<url><loc>https://www.codethreat.com/blogs/stop-hpp-before-it-starts</loc></url>
<url><loc>https://www.codethreat.com/blogs/command-injection-with-processbuilder</loc></url>
<url><loc>https://www.codethreat.com/blogs/four-security-backlog-items-you-should-never-diy</loc></url>
<url><loc>https://www.codethreat.com/blogs/evading-sast-a-developer-s-playbook-(not-recommended)</loc></url>
<url><loc>https://www.codethreat.com/blogs/building-codethreat-a-security-journey</loc></url>
<url><loc>https://www.codethreat.com/blogs/why-sast-tools-trigger-false-positives</loc></url>
<url><loc>https://www.codethreat.com/blogs/sast-vs-dast-which-one-actually-matters</loc></url>
<url><loc>https://www.codethreat.com/blogs/secure-software-possible</loc></url>
<url><loc>https://www.codethreat.com/blogs/breakfast-routine-of-a-brain-surgeon-who-loves-milk</loc></url>
<url><loc>https://www.codethreat.com/blogs/precision-vs-recall-code-security</loc></url>
<url><loc>https://www.codethreat.com/blogs/introducing-flowblot-net</loc></url>
<url><loc>https://www.codethreat.com/blogs/security-automation-explained</loc></url>
<url><loc>https://www.codethreat.com/blogs/is-input-validation-overrated</loc></url>
<url><loc>https://www.codethreat.com/blogs/file-upload-security-story-dotnet</loc></url>
<url><loc>https://www.codethreat.com/blogs/fixing-security-bugs-the-right-way</loc></url>
<url><loc>https://www.codethreat.com/blogs/when-sast-just-says-maybe</loc></url>
<url><loc>https://www.codethreat.com/blogs/sensitivities-in-static-code-analysis</loc></url>
<url><loc>https://www.codethreat.com/blogs/software-security-in-scrum</loc></url>
<url><loc>https://www.codethreat.com/blogs/codethreat-genai-onprem-integration</loc></url>
<url><loc>https://www.codethreat.com/blogs/software-development-life-cycle-sast-and-sca-combined</loc></url>
</urlset>