<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://laautopsia.com/noticia/pizza-hut-demandada-100-millones-tras</loc>
    <image:image>
      <image:loc>https://storage.googleapis.com/autopsia-45ba4.firebasestorage.app/incidents/manual-1779301757153-4em2es/apisdom-autopsia-noticias-n1-2026-05-20.webp</image:loc>
    </image:image>
    <news:news>
      <news:publication>
        <news:name>La AutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:47:40.050Z</news:publication_date>
      <news:title>Pizza Hut demandada por 100 millones tras fallos en su sistema de IA para entregas</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/noticia/herramienta-ia-borra-correo-directora-alineacion</loc>
    <image:image>
      <image:loc>https://storage.googleapis.com/autopsia-45ba4.firebasestorage.app/incidents/manual-1779304018653-8g4d9m/apisdom-autopsia-noticias-n2-2026-05-20.webp</image:loc>
    </image:image>
    <news:news>
      <news:publication>
        <news:name>La AutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T19:23:25.145Z</news:publication_date>
      <news:title>Una herramienta de IA borra el correo de la directora de Alineación de Meta pese a órdenes de parar</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/bypass-lista-dominios-permitidos-apify-model-context-protocol</loc>
    <image:image>
      <image:loc>https://storage.googleapis.com/autopsia-45ba4.firebasestorage.app/vulnerabilities/GHSA-jwp7-wg77-3w9v/apisdom-autopsia-alertas-a4-2026-05-20.webp</image:loc>
    </image:image>
    <news:news>
      <news:publication>
        <news:name>La AutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T17:22:58.420Z</news:publication_date>
      <news:title>Bypass de lista de dominios permitidos en Apify Model Context Protocol server via coincidencia de prefijos</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/vulnerabilidad-toctou-diffusers-permite-bypass-trustremotecode-ejecucion-remota</loc>
    <image:image>
      <image:loc>https://storage.googleapis.com/autopsia-45ba4.firebasestorage.app/vulnerabilities/GHSA-7wx4-6vff-v64p/apisdom-autopsia-alertas-a3-2026-05-20.webp</image:loc>
    </image:image>
    <news:news>
      <news:publication>
        <news:name>La AutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T17:17:25.288Z</news:publication_date>
      <news:title>Vulnerabilidad TOCTOU en Diffusers permite bypass de trust_remote_code y ejecución remota de código</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/ssrf-exfiltracion-disco-via-urls-validadas-authfetchmcp-afecta</loc>
    <image:image>
      <image:loc>https://storage.googleapis.com/autopsia-45ba4.firebasestorage.app/vulnerabilities/GHSA-hv85-774v-26fg/apisdom-autopsia-alertas-a2-2026-05-20.webp</image:loc>
    </image:image>
    <news:news>
      <news:publication>
        <news:name>La AutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:54:49.588Z</news:publication_date>
      <news:title>SSRF y exfiltracion de disco via URLs no validadas en auth-fetch-mcp afecta herramientas download_media y auth_fetch</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/9router-ejecucion-remota-codigo-autenticacion-via-rutas-mcp</loc>
    <image:image>
      <image:loc>https://storage.googleapis.com/autopsia-45ba4.firebasestorage.app/vulnerabilities/GHSA-fhh6-4qxv-rpqj/apisdom-autopsia-alertas-a1-2026-05-20.webp</image:loc>
    </image:image>
    <news:news>
      <news:publication>
        <news:name>La AutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T16:40:44.052Z</news:publication_date>
      <news:title>9router: Ejecución remota de código sin autenticación via rutas MCP de plugins personalizados</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/vulnerabilidad-ssrf-dns-rebinding-langchain-afecta-langchainopenai-antes</loc>
    <image:image>
      <image:loc>https://storage.googleapis.com/autopsia-45ba4.firebasestorage.app/vulnerabilities/CVE-2026-41488/apisdom-autopsia-alertas-a2-2026-05-19.webp</image:loc>
    </image:image>
    <news:news>
      <news:publication>
        <news:name>La AutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T10:30:00.044Z</news:publication_date>
      <news:title>Vulnerabilidad SSRF por DNS rebinding en LangChain afecta a langchain-openai antes de 1.1.14</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/dropper-malicioso-paquete-pypi-mistralai-246-afecta-sistemas</loc>
    <image:image>
      <image:loc>https://storage.googleapis.com/autopsia-45ba4.firebasestorage.app/vulnerabilities/GHSA-wx9m-wx4f-4cmg/apisdom-autopsia-alertas-a1-2026-05-19.webp</image:loc>
    </image:image>
    <news:news>
      <news:publication>
        <news:name>La AutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T09:53:24.628Z</news:publication_date>
      <news:title>Dropper malicioso en paquete PyPI mistralai 2.4.6 afecta sistemas Linux</news:title>
    </news:news>
  </url>
</urlset>