<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://blog.maass.xyz</loc>
    <lastmod>2026-04-07T20:27:17.560Z</lastmod>
    <changefreq>always</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://blog.maass.xyz/please-stop-calling-genai-useless</loc>
    <lastmod>2025-03-06T15:24:56.588Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.maass.xyz/encryption-isnt-enough-compromising-a-payment-processor-using-math</loc>
    <lastmod>2025-02-26T11:00:42.454Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.maass.xyz/spring-actuator-security-part-3-finding-exposed-actuators-using-dynamic-testing-with-ffuf</loc>
    <lastmod>2022-12-09T15:08:53.123Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.maass.xyz/spring-actuator-security-part-2-finding-actuators-using-static-code-analysis-with-semgrep</loc>
    <lastmod>2022-09-14T09:15:11.249Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.maass.xyz/spring-actuator-security-part-1-stealing-secrets-using-spring-actuators</loc>
    <lastmod>2022-09-12T14:25:48.714Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.maass.xyz/series/spring-actuator-security</loc>
    <lastmod>2026-04-07T20:27:17.560Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://blog.maass.xyz/archive</loc>
    <lastmod>2026-04-07T20:27:17.560Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.maass.xyz/recommendations</loc>
    <lastmod>2026-04-07T20:27:17.560Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.4</priority>
  </url>
</urlset>