<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.gecko.security</loc>
<lastmod>2026-04-15T15:22:42.324Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://www.gecko.security/blog</loc>
<lastmod>2026-04-15T15:22:42.324Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.gecko.security/careers</loc>
<lastmod>2026-04-15T15:22:42.324Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.gecko.security/events</loc>
<lastmod>2026-04-15T15:22:42.324Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.gecko.security/about</loc>
<lastmod>2026-04-15T15:22:42.324Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.gecko.security/bheu25</loc>
<lastmod>2026-04-15T15:22:42.324Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.gecko.security/privacy-policy</loc>
<lastmod>2026-04-15T15:22:42.324Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://www.gecko.security/terms-of-service</loc>
<lastmod>2026-04-15T15:22:42.324Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/api-scanning-complete-guide-automated-security-testing</loc>
<lastmod>2026-04-15T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/automated-pentest-guide-tools-best-practices</loc>
<lastmod>2026-04-15T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/best-ai-powered-application-security-testing-tools</loc>
<lastmod>2026-04-14T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/best-ai-security-tools</loc>
<lastmod>2026-04-14T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/claude-code-review-changed-ai-development</loc>
<lastmod>2026-04-13T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/claude-code-security-review-guide</loc>
<lastmod>2026-04-13T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cloud-native-security-platform-complete-guide</loc>
<lastmod>2026-04-12T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/codex-security-complete-guide-openai-code-vulnerability-scanner</loc>
<lastmod>2026-04-12T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cross-domain-authentication-complete-guide</loc>
<lastmod>2026-04-11T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/fix-environment-externally-managed-python-error</loc>
<lastmod>2026-04-11T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/gecko-security-vs-zeropath</loc>
<lastmod>2026-04-10T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/ghcr-github-container-registry-guide</loc>
<lastmod>2026-04-10T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/sast-vs-dast-guide</loc>
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/securing-ai-generated-code-complete-framework</loc>
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/sqli-cve-database</loc>
<lastmod>2026-04-08T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/ssrf-file-upload-processing-prevention-guide</loc>
<lastmod>2026-04-07T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/transitive-dependencies-explained-complete-guide</loc>
<lastmod>2026-04-06T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/what-is-secure-sdlc-guide</loc>
<lastmod>2026-04-05T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/what-is-sql-injection-prevention-methods-examples</loc>
<lastmod>2026-04-04T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/what-is-ssrf-server-side-request-forgery</loc>
<lastmod>2026-04-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/what-is-static-code-analysis</loc>
<lastmod>2026-04-02T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/why-gecko-security-isnt-iac-scanning-tool</loc>
<lastmod>2026-04-01T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/rce-in-your-test-suite-ai-agent-skills-bypass-skill-scanners</loc>
<lastmod>2026-03-11T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/business-logic-appsecs-unsolved-problem</loc>
<lastmod>2026-03-02T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2026-21894</loc>
<lastmod>2026-02-04T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2026-25055</loc>
<lastmod>2026-02-04T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/why-static-analysis-struggles-with-business-logic</loc>
<lastmod>2026-01-27T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/caldotcom-broken-access-controls</loc>
<lastmod>2026-01-26T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/gecko-30-0day-vulnerabilities</loc>
<lastmod>2025-07-31T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2025-54381</loc>
<lastmod>2025-07-29T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2025-53944</loc>
<lastmod>2025-07-11T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2025-48889</loc>
<lastmod>2025-05-29T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2025-51471</loc>
<lastmod>2025-05-16T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2025-51479</loc>
<lastmod>2025-05-14T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2025-51481</loc>
<lastmod>2025-05-14T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2025-51482</loc>
<lastmod>2025-05-14T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2025-51464</loc>
<lastmod>2025-05-12T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2025-51480</loc>
<lastmod>2025-05-12T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2025-51458</loc>
<lastmod>2025-04-28T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2025-51459</loc>
<lastmod>2025-04-28T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2025-51462</loc>
<lastmod>2025-04-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2025-51463</loc>
<lastmod>2025-04-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2025-51472</loc>
<lastmod>2025-04-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.gecko.security/blog/cve-2025-51475</loc>
<lastmod>2025-04-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
