<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/pptagent-ejecucion-arbitraria-codigo-via-eval-python-acceso</loc>
    <image:image>
      <image:loc>https://storage.googleapis.com/autopsia-45ba4.firebasestorage.app/vulnerabilities/GHSA-89g2-xw5c-v95p/apisdom-autopsia-alertas-a1-2026-05-o6.webp</image:loc>
    </image:image>
    <news:news>
      <news:publication>
        <news:name>La AutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T13:46:58.923Z</news:publication_date>
      <news:title>PPTAgent: Ejecución arbitraria de código via eval() de Python con acceso a builtins en LLM</news:title>
    </news:news>
  </url>
</urlset>