<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://stackresearch.org/tags/agentic-ai/</loc><lastmod>2026-04-28T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/alignment/</loc><lastmod>2026-04-28T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/categories/</loc><lastmod>2026-04-28T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/categories/engineering/</loc><lastmod>2026-04-28T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/evaluations/</loc><lastmod>2026-04-28T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/agentic-risk-awareness/</loc><lastmod>2026-04-28T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/categories/research/</loc><lastmod>2026-04-28T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/</loc><lastmod>2026-04-28T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/risk-management/</loc><lastmod>2026-04-28T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/safety-engineering/</loc><lastmod>2026-04-28T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/categories/security/</loc><lastmod>2026-04-28T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/</loc><lastmod>2026-04-28T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/</loc><lastmod>2026-04-28T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/agent-incident-drill/</loc><lastmod>2026-04-17T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/blast-radius/</loc><lastmod>2026-04-17T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/incident-response/</loc><lastmod>2026-04-17T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/kill-paths/</loc><lastmod>2026-04-17T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/lineage/</loc><lastmod>2026-04-17T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/rollback/</loc><lastmod>2026-04-17T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/categories/identity/</loc><lastmod>2026-04-10T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/nhi-asi-series-06-third-party-tools/</loc><lastmod>2026-04-10T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/non-human-identity/</loc><lastmod>2026-04-10T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/owasp/</loc><lastmod>2026-04-10T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/supply-chain/</loc><lastmod>2026-04-10T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/third-party-tools/</loc><lastmod>2026-04-10T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/artifact-intake-boundaries-for-agentic-systems/</loc><lastmod>2026-04-05T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/artifact-security/</loc><lastmod>2026-04-05T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/provenance/</loc><lastmod>2026-04-05T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/training-data/</loc><lastmod>2026-04-05T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/trust-boundaries/</loc><lastmod>2026-04-05T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/chain-of-thought/</loc><lastmod>2026-04-02T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/debugging/</loc><lastmod>2026-04-02T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/interpretability/</loc><lastmod>2026-04-02T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/llm/</loc><lastmod>2026-04-02T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/categories/oss/</loc><lastmod>2026-04-02T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/python/</loc><lastmod>2026-04-02T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/reasoning/</loc><lastmod>2026-04-02T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/trace-topology/</loc><lastmod>2026-04-02T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/agent-security-is-a-release-engineering-problem/</loc><lastmod>2026-03-29T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/least-privilege/</loc><lastmod>2026-03-29T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/memory-decay/</loc><lastmod>2026-03-29T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/memory-poisoning/</loc><lastmod>2026-03-29T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/agent-memory/</loc><lastmod>2026-03-23T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/agentic-memory-fabric/</loc><lastmod>2026-03-23T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/control-plane/</loc><lastmod>2026-03-23T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/governance/</loc><lastmod>2026-03-23T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/why-agent-memory-needs-a-control-plane/</loc><lastmod>2026-03-23T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/code-generation/</loc><lastmod>2026-03-17T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/compiler/</loc><lastmod>2026-03-17T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/executable-metaphors/</loc><lastmod>2026-03-17T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/metaphor/</loc><lastmod>2026-03-17T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/probing/</loc><lastmod>2026-03-16T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/the-unaskable-question-machine/</loc><lastmod>2026-03-16T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/genetic-prompt-programming/</loc><lastmod>2026-03-15T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/genetic-algorithms/</loc><lastmod>2026-03-15T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/optimization/</loc><lastmod>2026-03-15T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/prompt-engineering/</loc><lastmod>2026-03-15T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/agents/</loc><lastmod>2026-03-14T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/ai-systems/</loc><lastmod>2026-03-14T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/controlops/</loc><lastmod>2026-03-14T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/control-ops/</loc><lastmod>2026-03-14T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/decay/</loc><lastmod>2026-03-14T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/decision-lineage/</loc><lastmod>2026-03-14T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/entropyos/</loc><lastmod>2026-03-14T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/memory-should-decay/</loc><lastmod>2026-03-14T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/safety/</loc><lastmod>2026-03-14T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/state-management/</loc><lastmod>2026-03-14T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/systems-engineering/</loc><lastmod>2026-03-14T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/agents-get-socially-engineered-too/</loc><lastmod>2026-03-09T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/asi09/</loc><lastmod>2026-03-09T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/least-agency/</loc><lastmod>2026-03-09T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/categories/opinion/</loc><lastmod>2026-03-09T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/social-engineering/</loc><lastmod>2026-03-09T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/editorial/build-for-the-hour-after-failure/</loc><lastmod>2026-03-08T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/editorial/</loc><lastmod>2026-03-08T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/categories/incident-response/</loc><lastmod>2026-03-08T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/resilience/</loc><lastmod>2026-03-08T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/systems-design/</loc><lastmod>2026-03-08T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/accountability/</loc><lastmod>2026-02-24T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/nhi-asi-series-05-human-use-of-nhi/</loc><lastmod>2026-02-24T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/environment-isolation/</loc><lastmod>2026-02-21T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/nhi-asi-series-04-blast-radius/</loc><lastmod>2026-02-21T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/nhi-asi-series-03-secrets-and-memory/</loc><lastmod>2026-02-17T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/secrets/</loc><lastmod>2026-02-17T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/api-design/</loc><lastmod>2026-02-16T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/deterministic-systems/</loc><lastmod>2026-02-16T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/entropy-os/</loc><lastmod>2026-02-16T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/categories/software-lifecycle/</loc><lastmod>2026-02-16T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/editorial/software-that-expires/</loc><lastmod>2026-02-16T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/a-real-asi02-gap-we-caught-before-shipping/</loc><lastmod>2026-02-15T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/asi02/</loc><lastmod>2026-02-15T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/secure-by-design/</loc><lastmod>2026-02-15T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/testing/</loc><lastmod>2026-02-15T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/tool-misuse/</loc><lastmod>2026-02-15T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/agent-tools/</loc><lastmod>2026-02-14T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/nhi-asi-series-02-least-privilege-least-agency/</loc><lastmod>2026-02-14T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/research/nhi-asi-series-01-control-plane/</loc><lastmod>2025-12-26T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/tags/tool-control-plane/</loc><lastmod>2025-12-26T00:00:00+00:00</lastmod></url><url><loc>https://stackresearch.org/_/</loc></url></urlset>