<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.stepsecurity.io</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/dev/components</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/dev/designer-guide</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/dev/style-guide</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pricing</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/github-actions-and-stepsecurity</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/start-free</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/company</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/contact</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/gitlab-ci-security</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/jenkins-security</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/bitbucket-security</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/join-waitlist</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/azure-security</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/secured</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/incidents</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/newsroom</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/oss-package-security</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/dev-machine-guard</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/github-actions-audit</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/10-000-open-source-projects-now-secured-by-harden-runner-community-tier-a-milestone-three-years-in-the-making</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/10-layers-deep-how-stepsecurity-stops-teampcps-trivy-supply-chain-attack-on-github-actions</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/20-popular-npm-packages-compromised-chalk-debug-strip-ansi-color-convert-wrap-ansi</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/2024-in-review-the-evolution-of-ci-cd-security-whats-next</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/2025-in-review-the-evolution-of-supply-chain-security-whats-next</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/2500-public-repositories-secured-with-harden-runner</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/7-000-open-source-projects-now-secured-by-harden-runner-</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/8-000-harden-runners-growing-impact-on-ci-cd-security</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/9-000-open-source-projects-now-secured-by-harden-runner</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/a-mini-shai-hulud-has-appeared</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/analysis-of-backdoored-xz-utils-build-process-with-harden-runner</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/announcing-anomalous-outbound-call-detection-using-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/announcing-dependabot-configuration-enhancements-cooldown-and-group-support</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/announcing-general-availability-of-harden-runner</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/announcing-github-actions-advisor-and-stepsecurity-maintained-actions</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/announcing-policy-driven-automated-pull-requests-for-ci-cd-misconfiguration-remediation</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/announcing-stepsecuritys-integration-with-runson</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/another-npm-supply-chain-attack-the-is-package-compromise</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/anthropics-claude-code-action-security-how-to-secure-claude-code-in-github-actions-with-harden-runner</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/bake-harden-runner-into-githubs-custom-runner-images-for-organization-wide-ci-cd-security</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/behind-the-scenes-how-stepsecurity-detected-and-helped-remediate-the-largest-npm-supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/bittensor-wallet-4-0-2-compromised-on-pypi---backdoor-exfiltrates-private-keys</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/bitwarden-cli-hijacked-on-npm-bun-staged-credential-stealer-targets-developers-github-actions-and-ai-tools</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/build-secretless-ci-cd-pipelines-using-wait-for-secrets</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/calculate-your-ci-cd-security-roi-with-stepsecuritys-new-roi-calculator</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/canisterworm-how-a-self-propagating-npm-worm-is-spreading-backdoors-across-the-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/celebrating-1000-repositories-secured-with-harden-runner-a-journey-of-growth-and-collaboration</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/celebrating-2000-github-repositories-secured-with-harden-runner</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/celebrating-3000-github-repositories-secured-with-harden-runner</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/celebrating-3500-github-repositories-secured-with-harden-runner</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/checkmarx-kics-github-action-compromised-malware-injected-in-all-git-tags</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/ci-cd-security-for-self-hosted-vm-runners</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/cline-supply-chain-attack-detected-cline-2-3-0-silently-installs-openclaw</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/confidently-manage-risks-of-third-party-github-actions-in-your-ci-cd</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/critical-remote-code-execution-vulnerabilities-discovered-in-react-server-components-and-next-js</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/cve-2026-22709-critical-sandbox-escape-vulnerability-in-vm2</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/datadogs-devsecops-2026-report-validates-what-weve-been-building</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/defend-against-arbitrary-command-execution-in-tj-actions-changed-files</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/defend-your-github-actions-ci-cd-environment-in-public-repositories</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/deploy-actions-runner-controller-using-argocd</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/detect-leaked-secrets-in-github-action-workflow-artifacts</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/determine-minimum-github-token-permissions-using-ebpf-with-stepsecurity-harden-runner</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/dev-machine-guard-is-now-open-source-see-whats-really-running-on-your-developer-machine</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/do-you-maintain-a-github-action-contribute-to-the-secureworkflows-project</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/elementary-data-compromised-on-pypi-and-ghcr-forged-release-pushed-via-github-actions-script-injection</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/evolving-harden-runners-disable-sudo-policy-for-improved-runner-security</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/export-harden-runner-security-insights-and-detections-to-amazon-s3</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/forcememo-hundreds-of-github-python-repos-compromised-via-account-takeover-and-force-push</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/ghostaction-campaign-over-3-000-secrets-stolen-through-malicious-github-workflows</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/github-actions-goat-a-deliberately-vulnerable-github-actions-ci-cd-environment</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/github-actions-pwn-request-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/github-actions-runner-controller-blog-series</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/github-actions-secrets-management-best-practices</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/github-actions-security-a-case-study-with-google</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/github-actions-security-automation-for-private-repositories</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/github-actions-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/github-token-how-it-works-and-how-to-secure-automatic-github-action-tokens</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/grafana-github-actions-security-incident</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/hackerbot-claw-github-actions-exploitation</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/harden-runner-detects-anomalous-traffic-to-api-ipify-org-across-multiple-customers</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/harden-runner-detects-new-traffic-to-release-assets-githubusercontent-com-across-multiple-customers</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/harden-runner-expanding-to-more-ci-cd-providers</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/harden-runner-flags-anomalous-outbound-call-leading-to-docker-documentation-update</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/harden-runner-github-action-now-auto-detects-cache-endpoints</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/harden-runner-now-supports-windows-and-macos-github-actions-runners</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/how-harden-runner-detected-the-sha1-hulud-supply-chain-attack-in-cncfs-backstage-repository</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/how-stepsecurity-caught-a-release-storm-in-microsofts-types-packages</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/how-stepsecurity-harden-runner-detected-unexpected-microsoft-defender-installation-on-github-hosted-ubuntu-runners</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/how-to-use-docker-in-actions-runner-controller-runners-securelly</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/implement-internal-github-actions-marketplace-with-stepsecurity</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/introducing-ai-codewise-revolutionizing-code-reviews-with-ai-powered-analysis</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/introducing-apps-pats-centralized-visibility-for-github-apps-and-personal-access-tokens</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/introducing-harden-runner-for-kubernetes-based-self-hosted-actions-runners</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/introducing-harden-runner-policy-store</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/introducing-npm-package-search-find-where-any-package-was-introduced-across-your-github-organizations</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/introducing-stepsecurity-artifact-monitor-detect-unauthorized-software-releases-in-minutes-not-months</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/introducing-stepsecurity-developer-mdm-protecting-developer-machines-from-supply-chain-attacks</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/introducing-stepsecurity-threat-intelligence-real-time-supply-chain-attack-alerts-for-your-siem</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/introducing-the-game-changing-org-wide-dashboard-for-secure-software-development</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/introducing-the-npm-package-cooldown-check</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/introducing-the-runtime-detections-ui-for-stepsecurity-harden-runner</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/introducing-workflow-run-policies-guardrails-for-blocking-non-compliant-github-actions-runs</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/jenkins-to-github-actions-step-by-step-guide</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/kubernetes-el-compromised-how-a-pwn-request-exploited-a-popular-emacs-package</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/lessons-from-aws-codebuilds-memory-dump-incident-cve-2025-8217</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/lightning-obfuscated-javascript-credential-stealer-bundled-in-pypi-wheel</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/litellm-credential-stealer-hidden-in-pypi-wheel</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/malicious-iolitelabs-vscode-extensions-target-solidity-developers-on-windows-macos-and-linux-with-backdoor</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/malicious-npm-releases-found-in-popular-react-native-packages---130k-monthly-downloads-compromised</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/malicious-polymarket-bot-hides-in-hijacked-dev-protocol-github-org-and-steals-wallet-keys</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/mini-shai-hulud-is-back-a-self-spreading-supply-chain-attack-hits-the-npm-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/monitor-outbound-https-requests-from-github-actions-runners</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/new-features-for-github-actions-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/orchestrate-secret-scanning-and-linting-pre-commit-hooks-with-stepsecurity</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/orchestrating-security-stepsecuritys-impact-on-400-repositories-and-future-plans</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/pgserve-compromised-on-npm-malicious-versions-harvest-credentials</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/pinning-github-actions-for-enhanced-security-a-complete-guide</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/prevent-ultralytics-style-ci-cd-security-attacks-with-network-security-controls</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/publish-from-github-actions-using-multi-factor-authentication</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/pytorch-supply-chain-compromise</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/replace-third-party-actions-with-stepsecurity-maintained-actions-via-automated-pull-requests</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/scan-github-actions-build-logs-for-secrets-with-stepsecuritys-new-feature</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/secure-software-development-stepsecuritys-role-in-increasing-openssf-scorecard-scores</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/secure-your-actions-runner-controller-arc-environment-using-stepsecurity</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/securing-github-copilot-in-github-actions-with-harden-runner</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/securing-google-gemini-in-github-actions-with-harden-runner</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/securing-vibe-coding-and-ai-coding-agents-an-end-to-end-approach-with-stepsecurity</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/security-breach-in-stripe-repo-a-deep-dive-into-the-pwn-request-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/shai-hulud-worm-pivots-to-multi-cloud-intercom-client-hijacked</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecurity-harden-runner-detect-source-code-tampering-during-the-build-process</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecurity-harden-runner-featured-in-the-github-action-in-action-book</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecurity-harden-runner-now-secures-over-4-000-open-source-repositories</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecurity-harden-runner-now-secures-over-4-500-open-source-repositories</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecurity-harden-runner-now-supports-wildcard-domains-in-block-mode</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecurity-harden-runner-secures-over-5-000-open-source-projects</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecurity-is-now-available-on-aws-marketplace</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecurity-is-now-available-on-azure-marketplace</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecurity-is-sponsoring-github-universe-2025</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecurity-joins-the-open-source-security-foundation-openssf</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecurity-now-supports-dark-mode</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecurity-recognized-among-crns-10-hottest-devops-startups-of-2024</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecurity-seed-funding</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecurity-steps-up-security-game-with-soc-2-type-2-compliance</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecuritys-alignment-with-cisas-ci-cd-security-guidance</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecuritys-catalog-of-fixes</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/stepsecuritys-unified-protection-across-the-sdlc-infrastructure-threat-framework-sitf</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/streamline-your-github-actions-workflows-with-stepsecurity</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/supply-chain-security-alert-eslint-config-prettier-package-shows-signs-of-compromise</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/supply-chain-security-alert-num2words-pypi-package-shows-signs-of-compromise</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/supply-chain-security-alert-popular-nx-build-system-package-compromised-with-data-stealing-malware</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/suspicious-tag-movement-in-aws-github-action</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/teampcp-injects-two-stage-credential-stealer-into-xinference-pypi-package</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/teampcp-plants-wav-steganography-credential-stealer-in-telnyx-pypi-package</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/the-github-warning-everyone-ignores-this-commit-does-not-belong-to-any-branch</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/third-party-github-actions-governance-best-practices</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/top-2024-predictions-for-ci-cd-security</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/trivy-compromised-a-second-time---malicious-v0-69-4-release</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/unified-network-egress-view-centralize-github-actions-network-destinations-for-your-enterprise</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/uniting-developers-and-security-celebrating-the-success-of-500-open-source-projects-using-stepsecuritys-orchestration-platform</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/velora-dex-sdk-compromised-on-npm-malicious-version-drops-macos-backdoor-via-launchctl-persistence</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/when-ai-meets-ci-cd-coding-agents-in-github-actions-pose-hidden-security-risks</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/when-changed-files-changed-everything-our-black-hat-2025-presentation-on-the-tj-actions-supply-chain-breach</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/why-compliance-auditors-are-looking-at-your-ci-cd-runners-and-how-to-prepare</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/blog/xygeni-action-compromised-c2-reverse-shell-backdoor-injected-via-tag-poisoning</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/aquanow</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/arcjet</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/axios-npm</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/azure-karpenter-provider</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/bazel</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/chainguard</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/cisa</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/coveo</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/flank</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/google</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/hashgraph</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/healthcare-customer</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/inovintell</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/kapiche</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/kolsetu</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/microsoft</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/neon</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/omnissa</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/recidiviz</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/case-studies/trivy-action</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/azure</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/backstage</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/bazelbuild</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/block</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/chainguard</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/cisagov</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/coveo</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/dotnet</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/fleetdm</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/google</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/hashgraph</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/instructlab</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/intel</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/jaegertracing</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/kubernetes-sigs</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/microsoft</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/neon</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/newrelic</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/nodejs</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/picnicsupermarket</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/redhat-developer</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/runatlantis</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/samsung</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/sigstore</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/stirling-tools</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/pipelines-secured/usdigitalresponse</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/compromised-actions-policy</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/explore-secrets-exfiltration-policy</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/github-checks-harden-runner</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/harden-runner-analysis-of-nx-npm-package</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/harden-runner-detailed-demo</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/how-harden-runner-detected-the-tj-actions-supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/how-harden-runner-determines-minimum-github-token-permissions</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/how-to-create-runner-label-policy</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/how-to-get-your-github-actions-security-score</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/how-to-request-a-stepsecurity-maintained-action</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/how-to-setup-allowed-actions-policy</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/policy-driven</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/policy-driven-pull-requests</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/prevent-npm-supply-chain-attacks-with-harden-runner</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/replace-third-party-actions-with-stepsecurity-maintained-actions</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/stepsecurity-maintained-actions</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/product-tour/workflow-run-policies</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/aquanow</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/chainguard</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/coveo</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/coveo-xjr7w</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/dexcom</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/hashgraph</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/maple</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/mercari</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/mercor</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/miro</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/neon</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/neon-db</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/omnissa</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/paddle</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/recidiviz</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/rudderstack</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/xbow</loc>
    </url>
    <url>
        <loc>https://www.stepsecurity.io/enterprise-customers/xbow-2</loc>
    </url>
</urlset>