<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/litellm-vulnerable-escape-sandbox-guardrail-codigo-personalizado</loc>
    <image:image>
      <image:loc>https://storage.googleapis.com/autopsia-45ba4.firebasestorage.app/vulnerabilities/GHSA-wxxx-gvqv-xp7p/apisdom-autopsia-alertas-a1-2026-05-13.webp</image:loc>
    </image:image>
    <news:news>
      <news:publication>
        <news:name>La AutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T23:00:54.348Z</news:publication_date>
      <news:title>LiteLLM vulnerable a escape de sandbox en guardrail de código personalizado</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://laautopsia.com/vulnerabilidad/path-traversal-praisonai-mcp-permite-rce-via-inyeccion</loc>
    <image:image>
      <image:loc>https://storage.googleapis.com/autopsia-45ba4.firebasestorage.app/vulnerabilities/GHSA-9mqq-jqxf-grvw/apisdom-autopsia-alertas-a1-2026-05-11.webp</image:loc>
    </image:image>
    <news:news>
      <news:publication>
        <news:name>La AutopsIA</news:name>
        <news:language>es</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T18:43:18.682Z</news:publication_date>
      <news:title>Path traversal en PraisonAI MCP permite RCE via inyeccion de archivos .pth de Python</news:title>
    </news:news>
  </url>
</urlset>