<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.harshadev.com</loc>
<lastmod>2026-04-05T05:44:48.103Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://www.harshadev.com/about</loc>
<lastmod>2026-04-05T05:44:48.103Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/projects</loc>
<lastmod>2026-04-05T05:44:48.103Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog</loc>
<lastmod>2026-04-05T05:44:48.103Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.harshadev.com/contact</loc>
<lastmod>2026-04-05T05:44:48.103Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/anthropic-alters-third-party-integration-what-developers-need-to-know</loc>
<lastmod>2026-04-05T05:26:28.879Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/anthropic-adjusts-pricing-what-developers-need-to-know</loc>
<lastmod>2026-04-04T19:09:28.549Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/why-a-cybersecurity-legend-is-targeting-drone-safety</loc>
<lastmod>2026-04-04T13:33:30.172Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/anthropics-strategic-acquisition-a-new-era-in-ai-and-biotech-convergence</loc>
<lastmod>2026-04-04T08:02:02.625Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/anthropics-market-surge-amidst-spacex-ipo-speculations</loc>
<lastmod>2026-04-04T05:10:41.412Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/cybercrime-groups-attack-sparks-concern-across-europe</loc>
<lastmod>2026-04-03T19:14:27.929Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/openais-strategic-acquisition-what-the-tbpn-podcast-means-for-tech-enthusiasts</loc>
<lastmod>2026-04-03T13:42:30.409Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/exploring-emotion-like-processes-in-ai-with-claude</loc>
<lastmod>2026-04-03T08:12:19.269Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/amds-lemonade-accelerating-ai-with-open-source</loc>
<lastmod>2026-04-03T05:22:57.590Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/cursors-leap-forward-navigating-the-ai-coding-arena</loc>
<lastmod>2026-04-02T19:30:26.332Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/decoding-the-art-of-cyber-deception-lessons-from-forgery</loc>
<lastmod>2026-04-02T14:02:26.092Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/ai-powered-cyber-espionage-a-new-challenge-for-security</loc>
<lastmod>2026-04-02T08:34:46.291Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/explosive-q1-the-impact-of-record-breaking-startup-fundraising</loc>
<lastmod>2026-04-02T05:23:45.456Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/toyotas-woven-capital-the-new-leadership-spearheading-future-tech-ventures</loc>
<lastmod>2026-04-01T14:11:58.423Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/the-accidental-release-of-claude-code-understanding-its-impact</loc>
<lastmod>2026-04-01T09:35:49.316Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/examining-the-impact-of-a-cyberattack-on-open-source-projects</loc>
<lastmod>2026-04-01T05:36:34.930Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/the-crucial-role-of-unified-exposure-management-in-ai-powered-cybersecurity</loc>
<lastmod>2026-03-31T19:35:04.488Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/navigating-the-vertex-ai-security-gap-implications-for-cloud-developers</loc>
<lastmod>2026-03-31T19:18:58.661Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/securing-ai-openais-latest-vulnerability-fixes</loc>
<lastmod>2026-03-31T18:32:45.033Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/uncovering-vulnerabilities-in-langchain-and-langgraph-frameworks</loc>
<lastmod>2026-03-31T17:50:07.863Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/security-breaches-unveiled-in-langchain-and-langgraph-what-developers-need-to-know</loc>
<lastmod>2026-03-31T18:09:27.966Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/unveiling-critical-security-risks-in-langchain-and-langgraph</loc>
<lastmod>2026-03-30T20:38:44.600Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/how-recent-vulnerabilities-in-langchain-and-langgraph-impact-ai-development</loc>
<lastmod>2026-03-30T08:53:37.351Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/addressing-security-vulnerabilities-in-langchain-and-langgraph</loc>
<lastmod>2026-03-31T18:15:15.203Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/security-flaws-in-langchain-and-langgraph-what-developers-need-to-know-1774791156731</loc>
<lastmod>2026-03-29T13:32:36.852Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/critical-vulnerabilities-in-langchain-and-langgraph-what-developers-need-to-know</loc>
<lastmod>2026-03-29T08:01:27.295Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/security-alerts-vulnerabilities-uncovered-in-langchain-and-langgraph</loc>
<lastmod>2026-03-30T20:39:05.925Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/security-flaws-in-langchain-and-langgraph-what-developers-need-to-know</loc>
<lastmod>2026-03-30T05:22:42.430Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/a-deep-dive-into-recent-langchain-and-langgraph-security-vulnerabilities</loc>
<lastmod>2026-03-30T20:46:01.286Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/critical-vulnerabilities-in-langchain-and-langgraph-expose-sensitive-data</loc>
<lastmod>2026-03-28T07:59:18.132Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/unveiling-security-gaps-in-ai-frameworks-langchain-and-langgraph-under-scrutiny</loc>
<lastmod>2026-03-28T05:10:43.929Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/security-flaws-in-langchain-and-langgraph-a-wake-up-call-for-developers</loc>
<lastmod>2026-03-27T19:24:05.926Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/exposing-the-security-flaw-in-claudes-chrome-extension</loc>
<lastmod>2026-03-30T20:37:35.082Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/critical-security-flaw-in-claude-extension-a-cautionary-tale-for-developers</loc>
<lastmod>2026-03-27T05:23:53.286Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/arms-foray-into-chip-production-a-new-era-in-ai-hardware</loc>
<lastmod>2026-03-26T08:11:45.226Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/arms-foray-into-ai-designing-chips-for-tech-titans</loc>
<lastmod>2026-03-26T05:21:56.738Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/arm-ventures-into-ai-chips-with-industry-giants-as-clients</loc>
<lastmod>2026-03-25T08:05:45.238Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/arm-ventures-into-chip-manufacturing-what-it-means-for-the-tech-industry</loc>
<lastmod>2026-03-25T09:33:54.923Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/navigating-open-ai-agent-vulnerabilities-a-closer-look-at-openclaws-challenges</loc>
<lastmod>2026-03-28T13:45:03.550Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/inside-amazons-trailblazing-trainium-chip-lab-a-tech-revolution</loc>
<lastmod>2026-03-23T19:27:43.096Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/inside-look-at-amazons-game-changing-trainium-chip-lab</loc>
<lastmod>2026-03-28T05:08:58.330Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/inside-amazons-revolutionary-trainium-lab-a-game-changer-in-ai</loc>
<lastmod>2026-03-23T16:00:22.103Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/exploring-slopoly-ais-role-in-modern-malware-development</loc>
<lastmod>2026-03-23T16:00:02.420Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/how-ai-driven-malware-like-slopoly-is-changing-cybersecurity</loc>
<lastmod>2026-03-23T15:58:18.083Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/ai-powered-malware-emergence-the-case-of-slopoly</loc>
<lastmod>2026-03-22T13:25:17.801Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/emerging-threat-the-rise-of-ai-driven-malware-in-cybersecurity</loc>
<lastmod>2026-03-22T07:54:32.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/ai-and-ransomware-unveiling-slopolys-threat-to-cybersecurity</loc>
<lastmod>2026-03-22T05:08:39.587Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/ai-and-cybersecurity-the-impact-of-slopoly-malware</loc>
<lastmod>2026-03-26T21:01:19.831Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/ai-and-malware-the-rise-of-slopoly-in-cybersecurity-threats</loc>
<lastmod>2026-03-21T13:15:47.882Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/walmart-teams-up-with-openai-and-google-a-new-era-of-shopping-bots</loc>
<lastmod>2026-03-21T07:50:48.986Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/how-walmart-and-openai-are-revolutionizing-e-commerce-with-ai</loc>
<lastmod>2026-03-21T04:52:53.126Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/walmart-and-openai-revolutionize-shopping-with-ai-chatbot-integration</loc>
<lastmod>2026-03-20T19:12:14.113Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/walmarts-strategic-shift-integrating-sparky-into-ai-platforms</loc>
<lastmod>2026-03-20T13:38:30.790Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/elevate-your-ai-game-5-python-decorators-you-cant-ignore</loc>
<lastmod>2026-03-20T13:14:26.934Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/supercharge-your-ai-projects-with-python-decorators</loc>
<lastmod>2026-03-20T13:12:23.854Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/how-walmarts-innovation-with-sparky-is-redefining-ai-shopping</loc>
<lastmod>2026-03-20T08:00:38.700Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/walmarts-strategic-move-integrating-sparky-with-ai-giants</loc>
<lastmod>2026-03-20T05:03:38.688Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/how-walmart-and-openai-are-revolutionizing-the-shopping-experience</loc>
<lastmod>2026-03-20T13:08:10.544Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/arena-the-defining-leaderboard-for-ai-models</loc>
<lastmod>2026-03-19T13:46:13.232Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/arenas-rise-a-game-changer-for-ai-leaderboards</loc>
<lastmod>2026-03-19T13:24:49.292Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/arena-revolutionizing-ai-model-rankings</loc>
<lastmod>2026-03-19T05:11:08.997Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/arena-the-emerging-leaderboard-for-ai-models</loc>
<lastmod>2026-03-19T02:19:51.306Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/revolutionizing-game-development-with-ai-the-godogen-project</loc>
<lastmod>2026-03-18T13:58:37.960Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/revolutionizing-game-development-godogens-ai-driven-approach</loc>
<lastmod>2026-03-18T08:05:01.890Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/transforming-godot-game-development-with-ai-a-closer-look-at-godogen</loc>
<lastmod>2026-03-18T07:58:21.761Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/revolutionizing-game-development-with-godogen-and-claude-code</loc>
<lastmod>2026-03-18T03:04:05.531Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/the-rise-of-ai-driven-malware-like-slopoly-what-developers-need-to-know</loc>
<lastmod>2026-03-17T13:55:40.720Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/securing-ai-agents-auditing-the-risks-of-automating-workflows</loc>
<lastmod>2026-03-17T10:52:03.652Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/exploring-the-impact-of-openai-codex-security-on-code-management</loc>
<lastmod>2026-03-17T08:05:57.413Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/exploring-openais-codex-security-a-new-era-in-vulnerability-analysis</loc>
<lastmod>2026-03-17T05:10:00.849Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/unpacking-openclaw-ai-agent-vulnerabilities-what-developers-need-to-know</loc>
<lastmod>2026-03-17T02:57:22.609Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/ai-in-cyber-siege-a-dive-into-transparent-tribes-latest-tactics</loc>
<lastmod>2026-03-17T02:50:58.423Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/how-ai-is-shaping-the-future-of-cyber-threats-with-slopoly</loc>
<lastmod>2026-03-16T14:21:06.734Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/openai-codex-security-revolutionizing-code-vulnerability-detection-1773669512211</loc>
<lastmod>2026-03-16T13:58:32.418Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/openai-codex-security-revolutionizing-code-vulnerability-detection-1773666811024</loc>
<lastmod>2026-03-16T13:23:24.569Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/how-codex-security-is-revolutionizing-code-vulnerability-detection</loc>
<lastmod>2026-03-16T13:13:11.028Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/openais-codex-security-revolutionizing-vulnerability-detection</loc>
<lastmod>2026-03-16T16:41:25.034Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/revolutionizing-security-how-openais-codex-enhances-code-safety</loc>
<lastmod>2026-03-16T02:31:14.732Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/openais-codex-security-revolutionizes-code-safety</loc>
<lastmod>2026-03-15T13:28:07.795Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/building-powerful-llm-pipelines-with-outlines-and-pydantic</loc>
<lastmod>2026-03-15T12:19:29.679Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/openai-codex-security-ais-new-ally-in-code-safety</loc>
<lastmod>2026-03-15T12:07:50.982Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/codex-security-openais-ai-driven-solution-to-code-vulnerabilities</loc>
<lastmod>2026-03-15T07:58:36.892Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/harnessing-ai-for-code-security-openai-codexs-latest-breakthrough</loc>
<lastmod>2026-03-15T05:17:46.625Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/the-rise-of-ai-agents-exploring-the-viral-hit-on-github</loc>
<lastmod>2026-03-15T05:08:42.284Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/exploring-openais-codex-security-ais-role-in-enhancing-code-safety</loc>
<lastmod>2026-03-14T19:04:07.004Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/exploring-the-impact-of-openai-codex-security-on-software-development</loc>
<lastmod>2026-03-15T05:03:13.827Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/openai-codex-security-revolutionizing-code-vulnerability-detection</loc>
<lastmod>2026-03-14T16:42:33.563Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/exploring-openais-codex-security-a-leap-forward-in-ai-powered-code-analysis</loc>
<lastmod>2026-03-14T04:58:29.802Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/openai-codex-security-a-new-era-in-software-vulnerability-management</loc>
<lastmod>2026-03-13T19:08:02.524Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/revolutionizing-code-security-openai-codexs-latest-advances</loc>
<lastmod>2026-03-13T13:38:58.711Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/the-impact-of-ai-powered-security-on-developer-workflows</loc>
<lastmod>2026-03-13T13:11:14.773Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/openais-codex-security-a-new-era-in-code-vulnerability-scanning</loc>
<lastmod>2026-03-13T05:00:39.859Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/ai-security-revolution-openais-codex-explores-new-safeguards-in-code</loc>
<lastmod>2026-03-13T13:45:04.681Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/nuro-goes-global-testing-autonomous-vehicles-in-tokyo</loc>
<lastmod>2026-03-12T17:23:38.052Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/nuro-ventures-into-tokyo-a-new-chapter-for-autonomous-vehicles</loc>
<lastmod>2026-03-14T16:43:14.897Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/nuros-autonomous-journey-tokyo-as-a-canvas-for-innovation</loc>
<lastmod>2026-03-13T02:18:09.525Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/revolutionizing-code-security-openai-codexs-recent-launch</loc>
<lastmod>2026-03-12T04:04:17.077Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/ai-powered-codex-security-transforming-vulnerability-management</loc>
<lastmod>2026-03-11T05:19:01.213Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/revolutionizing-code-security-openais-codex-identifies-vulnerabilities-in-over-a-million-commits</loc>
<lastmod>2026-03-24T16:21:39.782Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/must-have-python-libraries-for-aspiring-llm-engineers</loc>
<lastmod>2026-03-10T14:51:08.609Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/navigating-the-fine-line-between-online-safety-and-privacy</loc>
<lastmod>2026-03-10T14:48:05.168Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/openai-codex-security-unveiling-a-new-era-in-ai-powered-vulnerability-detection</loc>
<lastmod>2026-03-10T13:42:00.005Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/pentagons-supply-chain-designation-puts-anthropic-in-the-spotlight</loc>
<lastmod>2026-03-10T07:58:34.259Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/pentagons-controversial-move-raises-alarms-in-ai-industry</loc>
<lastmod>2026-03-10T04:56:53.578Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/ai-powered-threats-transparent-tribes-new-tactics-and-their-implications</loc>
<lastmod>2026-03-10T04:28:44.786Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/how-ai-is-powering-a-new-wave-of-cyber-threats</loc>
<lastmod>2026-03-10T00:46:11.780Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/unlocking-ais-profit-potential-7-strategies-for-success-in-2026</loc>
<lastmod>2026-03-09T17:15:30.975Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/claude-chatbot-controversy-anthropics-legal-battle-with-the-dod</loc>
<lastmod>2026-03-09T17:13:06.725Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/delving-into-algebraic-topology-understanding-knots-links-and-braids</loc>
<lastmod>2026-03-09T17:08:16.232Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/revolutionizing-code-security-openais-codex-security-unveiled</loc>
<lastmod>2026-03-09T17:04:54.709Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/mastering-machine-learning-at-scale-tips-for-managing-multiple-models</loc>
<lastmod>2026-03-10T00:46:30.421Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/anthropics-ai-ethics-clash-with-pentagons-military-ambitions</loc>
<lastmod>2026-03-09T16:25:29.301Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/navigating-the-ai-supply-chain-anthropics-stand-against-pentagon-classification</loc>
<lastmod>2026-03-09T16:36:20.483Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/navigating-the-ai-battlefield-the-pentagons-move-against-anthropic</loc>
<lastmod>2026-03-09T17:02:54.985Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/navigating-federal-contracts-what-startups-can-learn-from-anthropics-challenge-with-the-pentagon</loc>
<lastmod>2026-03-09T03:07:22.417Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/anthropics-misstep-lessons-for-startups-on-navigating-federal-contracts</loc>
<lastmod>2026-03-08T15:22:12.303Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/navigating-federal-contracts-lessons-from-anthropics-pentagon-experience-1772956112303</loc>
<lastmod>2026-03-08T07:48:32.440Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/anthropics-pentagon-trial-a-lesson-in-federal-contracts-for-startups</loc>
<lastmod>2026-03-08T11:21:57.513Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/navigating-federal-contracts-lessons-from-anthropics-pentagon-experience</loc>
<lastmod>2026-03-08T05:19:18.152Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/navigating-pentagon-deals-lessons-for-startups-from-anthropics-setback</loc>
<lastmod>2026-03-08T07:40:18.472Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/revolutionizing-code-security-openai-codex-scans-detects-and-corrects-vulnerabilities</loc>
<lastmod>2026-03-07T18:57:00.810Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/unpacking-gpt-54-the-future-of-ai-thinking-systems</loc>
<lastmod>2026-03-07T14:57:17.217Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/a-cautionary-tale-anthropics-pentagon-deal-collapse</loc>
<lastmod>2026-03-07T14:24:43.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/unveiling-gpt-54-a-leap-forward-in-ai-thought-processes</loc>
<lastmod>2026-03-07T13:07:54.600Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/exploring-the-powers-of-gpt-54-what-developers-need-to-know</loc>
<lastmod>2026-03-07T12:54:33.349Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/fortifying-firefox-how-anthropics-claude-is-revolutionizing-browser-security</loc>
<lastmod>2026-03-08T07:13:53.660Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/anthropics-pentagon-deal-collapse-a-lesson-in-federal-contracts</loc>
<lastmod>2026-03-07T08:37:54.586Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/anthropics-pentagon-debacle-lessons-in-navigating-federal-contracts</loc>
<lastmod>2026-03-07T08:33:54.792Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/navigating-the-threats-of-malicious-npm-packages-what-developers-need-to-know</loc>
<lastmod>2026-03-07T08:41:53.115Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/exploring-the-intricate-dance-between-openai-microsoft-and-the-pentagon</loc>
<lastmod>2026-03-07T07:30:58.315Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/the-rise-of-ai-powered-malware-what-developers-need-to-know</loc>
<lastmod>2026-03-07T07:26:31.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/complexities-of-ai-in-defense-balancing-innovation-and-security</loc>
<lastmod>2026-03-07T10:41:56.926Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/navigating-federal-contracts-lessons-from-anthropics-pentagon-challenge</loc>
<lastmod>2026-03-07T07:22:43.502Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/how-to-thrive-as-a-developer-in-the-era-of-ai</loc>
<lastmod>2026-03-07T06:30:54.129Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/harnessing-the-power-of-multiple-gpus-understanding-zero-and-fsdp-in-pytorch</loc>
<lastmod>2026-03-07T06:10:14.433Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/developing-production-ready-code-with-claude-code</loc>
<lastmod>2026-03-07T05:57:59.212Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/the-mystery-of-the-missing-ipad-12-with-apple-intelligence</loc>
<lastmod>2026-03-07T04:50:02.456Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/mastering-system-design-10-essential-github-repositories</loc>
<lastmod>2026-03-06T19:19:59.326Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/thriving-in-the-age-of-ai-the-undying-value-of-human-work</loc>
<lastmod>2026-03-06T15:09:42.191Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/unlocking-encrypted-hard-drives-remotely-a-modern-approach</loc>
<lastmod>2026-03-06T09:14:56.886Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/permission-based-saas-architecture</loc>
<lastmod>2026-03-26T12:51:51.136Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/nodejs-module-based-vs-mvc-architecture</loc>
<lastmod>2026-03-19T11:22:15.790Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.harshadev.com/blog/aws-vs-azure-cloud-architecture-comparison</loc>
<lastmod>2026-04-01T09:39:15.541Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
