<?xml version="1.0" encoding="UTF-8"?>
<urlset
  xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
>
  <url>
    <loc>https://invaders.ie/resources/blog/cloud-and-application-security/cve-2026-42208-litellm-pre-auth-sqli-secrets-exposure</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T08:06:53.255Z</news:publication_date>
      <news:title>CVE-2026-42208 turns exposed LiteLLM gateways into a secrets exposure risk</news:title>
      <news:keywords>CVE-2026-42208, LiteLLM SQL injection, LiteLLM pre-auth SQLi, AI gateway secrets exposure, LiteLLM active exploitation, LLM proxy API key risk</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://invaders.ie/resources/blog/supply-chain-security/glassworm-openvsx-sleeper-extensions-malware-delivery</loc>
    <news:news>
      <news:publication>
        <news:name>Invaders Security</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-28T08:06:19.898Z</news:publication_date>
      <news:title>GlassWorm sleeper extensions turn Open VSX updates into a malware delivery path</news:title>
      <news:keywords>GlassWorm Open VSX sleeper extensions, OpenVSX malicious extension update, developer supply chain malware, VSIX payload delivery, GitHub hosted extension malware, developer secrets theft</news:keywords>
    </news:news>
  </url>
</urlset>