<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://moanju.org/</loc></url><url><loc>https://moanju.org/about/</loc></url><url><loc>https://moanju.org/demopool/</loc></url><url><loc>https://moanju.org/framework/</loc></url><url><loc>https://moanju.org/framework/page/2/</loc></url><url><loc>https://moanju.org/policy/</loc></url><url><loc>https://moanju.org/posts/</loc></url><url><loc>https://moanju.org/posts/%E4%B8%8D%E6%AD%A2%E4%BA%8E%E9%9A%90%E7%A7%81%E4%BB%8Echatgpt%E8%81%8A%E5%A4%A9%E8%AE%B0%E5%BD%95%E6%8E%A8%E6%96%AD%E7%94%A8%E6%88%B7%E4%BA%BA%E6%A0%BC%E7%89%B9%E5%BE%81/</loc></url><url><loc>https://moanju.org/posts/%E8%87%AA%E4%B8%BB%E5%95%86%E4%B8%9A%E6%99%BA%E8%83%BD%E4%BD%93%E7%9A%8412%E7%B1%BB%E6%94%BB%E5%87%BB%E5%90%91%E9%87%8F%E5%92%8C%E4%BA%94%E5%B1%82%E5%AE%89%E5%85%A8%E6%A1%86%E6%9E%B6/</loc></url><url><loc>https://moanju.org/posts/2036-ai-rewrite-org/</loc></url><url><loc>https://moanju.org/posts/aethelgard-agent-least-privilege/</loc></url><url><loc>https://moanju.org/posts/agent-%E7%9A%84%E8%AE%B0%E5%BF%86%E4%B9%9F%E4%BC%9A%E8%A2%AB%E6%8A%95%E6%AF%92%E9%95%BF%E6%9C%9F%E8%AE%B0%E5%BF%86%E5%AE%89%E5%85%A8%E7%9A%84%E5%85%AD%E9%98%B6%E6%AE%B5%E6%A1%86%E6%9E%B6/</loc></url><url><loc>https://moanju.org/posts/agent-html-hidden-token-tax/</loc></url><url><loc>https://moanju.org/posts/agent-security-attack-surface-reconstruction/</loc></url><url><loc>https://moanju.org/posts/agent-security-classification/</loc></url><url><loc>https://moanju.org/posts/agentbound-mcp-server-permission-boundary/</loc></url><url><loc>https://moanju.org/posts/agentward-agent-lifecycle-security/</loc></url><url><loc>https://moanju.org/posts/ai-agent-attack-examples-owasp-2026/</loc></url><url><loc>https://moanju.org/posts/ai-computing-platform-security-features/</loc></url><url><loc>https://moanju.org/posts/ai-consciousness-framework/</loc></url><url><loc>https://moanju.org/posts/ai-governance-key-directions-2025-04/</loc></url><url><loc>https://moanju.org/posts/ai-plus-action-opinion-interpretation/</loc></url><url><loc>https://moanju.org/posts/ai%E6%94%BF%E5%8A%A1%E6%8C%87%E5%BC%954%E4%B8%AA%E5%9C%BA%E6%99%AF4%E4%B8%AA%E9%83%A8%E7%BD%B2%E8%A7%84%E8%8C%836%E4%B8%AA%E5%AE%89%E5%85%A8%E6%8E%AA%E6%96%BD/</loc></url><url><loc>https://moanju.org/posts/aip-agent-identity-protocol/</loc></url><url><loc>https://moanju.org/posts/avise%E6%8A%8A%E5%A4%A7%E6%A8%A1%E5%9E%8B%E7%BA%A2%E9%98%9F%E6%B5%8B%E8%AF%95%E5%81%9A%E6%88%90%E8%87%AA%E5%8A%A8%E5%8C%96%E5%AE%89%E5%85%A8%E8%AF%84%E6%B5%8B%E6%B5%81%E6%B0%B4%E7%BA%BF/</loc></url><url><loc>https://moanju.org/posts/cai-anthropomorphic-interaction-service-regulation/</loc></url><url><loc>https://moanju.org/posts/china-agent-governance-regulation-2026/</loc></url><url><loc>https://moanju.org/posts/china-llm-content-regulations/</loc></url><url><loc>https://moanju.org/posts/china-llm-security-national-standards/</loc></url><url><loc>https://moanju.org/posts/claude-mythos-%E4%B8%8D%E5%85%AC%E5%BC%80%E5%AF%B9%E4%B8%AD%E5%9B%BD%E6%84%8F%E5%91%B3%E7%9D%80%E4%BB%80%E4%B9%88/</loc></url><url><loc>https://moanju.org/posts/clawdgo%E7%BB%99%E8%87%AA%E4%B8%BB-agent-%E5%81%9A%E5%AE%89%E5%85%A8%E6%84%8F%E8%AF%86%E8%AE%AD%E7%BB%83/</loc></url><url><loc>https://moanju.org/posts/confucian-six-arts-agent/</loc></url><url><loc>https://moanju.org/posts/deepseek-v4-agent-security/</loc></url><url><loc>https://moanju.org/posts/deepseekr1-content-safetyeval-nature/</loc></url><url><loc>https://moanju.org/posts/global-ai-governance-political-foundations/</loc></url><url><loc>https://moanju.org/posts/google-agent-security-framework-2025/</loc></url><url><loc>https://moanju.org/posts/google-ai-security-threats-2025/</loc></url><url><loc>https://moanju.org/posts/government-llm-application-security-requirements/</loc></url><url><loc>https://moanju.org/posts/gpt-image-2-ai-safety-analysis/</loc></url><url><loc>https://moanju.org/posts/gpt55-system-card/</loc></url><url><loc>https://moanju.org/posts/hallucination-accuracy-tradeoff/</loc></url><url><loc>https://moanju.org/posts/harmful-skill-bench/</loc></url><url><loc>https://moanju.org/posts/iso-iec-23894-ai-risk-management-guide/</loc></url><url><loc>https://moanju.org/posts/iso-iec-42005-ai-risk-management-guide/</loc></url><url><loc>https://moanju.org/posts/isoiec-42001%E6%B7%B1%E5%BA%A6%E8%A7%A3%E8%AF%BB%E9%A6%96%E4%B8%AAai%E6%B2%BB%E7%90%86%E7%AE%A1%E7%90%86%E4%BD%93%E7%B3%BB%E5%9B%BD%E9%99%85%E6%A0%87%E5%87%862023/</loc></url><url><loc>https://moanju.org/posts/jailbreaking-vs-guardrail/</loc></url><url><loc>https://moanju.org/posts/lasm-agent-security-seven-layers/</loc></url><url><loc>https://moanju.org/posts/litellm-pypi-supply-chain-incident-2026/</loc></url><url><loc>https://moanju.org/posts/llm-guardrail-key-metrics/</loc></url><url><loc>https://moanju.org/posts/llm-jailbreak-attack-methods-2025-08/</loc></url><url><loc>https://moanju.org/posts/mitre-ai-attack-strategy-2023/</loc></url><url><loc>https://moanju.org/posts/mitre-ai-security-strategy-2023/</loc></url><url><loc>https://moanju.org/posts/mythos-agent-adversary-safety-boundary/</loc></url><url><loc>https://moanju.org/posts/nist-ai-800-4-monitoring/</loc></url><url><loc>https://moanju.org/posts/nist-ai-security-threats-2023/</loc></url><url><loc>https://moanju.org/posts/nist-ai-standards-five-layer-evaluation-framework-2026-01/</loc></url><url><loc>https://moanju.org/posts/nvida-ai-security-framework-2025/</loc></url><url><loc>https://moanju.org/posts/openclaw-domestic-agent-security-eval-report/</loc></url><url><loc>https://moanju.org/posts/openclaw-security-framework-attack-surface/</loc></url><url><loc>https://moanju.org/posts/owasp-agent-framework-2025/</loc></url><url><loc>https://moanju.org/posts/owasp-agent-risk-migration-2025/</loc></url><url><loc>https://moanju.org/posts/owasp-agent-top-10-security-threats-2026/</loc></url><url><loc>https://moanju.org/posts/owasp-agentic-skill-top-10/</loc></url><url><loc>https://moanju.org/posts/owasp-aivss-v0.5-2025/</loc></url><url><loc>https://moanju.org/posts/owasp-llm-top-10-security-threats-2025/</loc></url><url><loc>https://moanju.org/posts/owasp-mcp-top-10/</loc></url><url><loc>https://moanju.org/posts/page/2/</loc></url><url><loc>https://moanju.org/posts/page/3/</loc></url><url><loc>https://moanju.org/posts/page/4/</loc></url><url><loc>https://moanju.org/posts/page/5/</loc></url><url><loc>https://moanju.org/posts/page/6/</loc></url><url><loc>https://moanju.org/posts/page/7/</loc></url><url><loc>https://moanju.org/posts/page/8/</loc></url><url><loc>https://moanju.org/posts/points-seeker-agent-capability/</loc></url><url><loc>https://moanju.org/posts/policybank-agent/</loc></url><url><loc>https://moanju.org/posts/prompt-injection-wrapper-defense-impossible-triangle/</loc></url><url><loc>https://moanju.org/posts/RENNEVATE/</loc></url><url><loc>https://moanju.org/posts/safe-harness-agent-runtime-security/</loc></url><url><loc>https://moanju.org/posts/sif-multi-agent-implicit-flow-attack/</loc></url><url><loc>https://moanju.org/posts/skill-attack-agent-skill-red-team/</loc></url><url><loc>https://moanju.org/posts/skillsieve-agent-skill-security/</loc></url><url><loc>https://moanju.org/posts/tracesafe-bench/</loc></url><url><loc>https://moanju.org/posts/trinity-guard-multi-agent-security-eval/</loc></url><url><loc>https://moanju.org/posts/trusted-action-checklist/</loc></url><url><loc>https://moanju.org/posts/wangxinban-2026-ai/</loc></url><url><loc>https://moanju.org/posts/webagentguard-web-agent-security/</loc></url><url><loc>https://moanju.org/regulations/</loc></url><url><loc>https://moanju.org/reports/</loc></url><url><loc>https://moanju.org/reports/2025-owasp-top10-llm/</loc></url><url><loc>https://moanju.org/reports/Artificial-Intelligence-Risk-Management-Framework/</loc></url><url><loc>https://moanju.org/reports/Cybersecuritytechnology%E2%80%94Basicsecurityrequirementsforgenerativeartificialintelligenceservice/</loc></url><url><loc>https://moanju.org/reports/Cybersecuritytechnology%E2%80%94Generativeartificialintelligencedataannotationsecurityspecification/</loc></url><url><loc>https://moanju.org/reports/Cybersecuritytechnology%E2%80%94Labelingmethodforcontentgeneratedbyartificialintelligence/</loc></url><url><loc>https://moanju.org/reports/Cybersecuritytechnology%E2%80%94Securityframeworkforartificialintelligencecomputingplatform/</loc></url><url><loc>https://moanju.org/reports/Cybersecuritytechnology%E2%80%94Securityspecificationforgenerativeartificialintelligencepre-trainingandfine-tuningdata/</loc></url><url><loc>https://moanju.org/reports/framework/</loc></url><url><loc>https://moanju.org/reports/nvidia-ai-security-framework/</loc></url><url><loc>https://moanju.org/reports/owasp-top10-agent-2026/</loc></url><url><loc>https://moanju.org/reports/standard/</loc></url><url><loc>https://moanju.org/reports/TC260-004-Security-Requirements-for-Government-LLM-Applications/</loc></url><url><loc>https://moanju.org/reports/tc260-pg-20261a/</loc></url><url><loc>https://moanju.org/reports/wanganbiaowei-ai-risk-security-governance-framework-1.0/</loc></url><url><loc>https://moanju.org/reports/wanganbiaowei-ai-risk-security-governance-framework-2.0/</loc></url><url><loc>https://moanju.org/reports/zhangbo-agi-20260110/</loc></url><url><loc>https://moanju.org/search/</loc></url><url><loc>https://moanju.org/standards/</loc></url><url><loc>https://moanju.org/tech/</loc></url><url><loc>https://moanju.org/tech/page/2/</loc></url><url><loc>https://moanju.org/tech/page/3/</loc></url><url><loc>https://moanju.org/tech/page/4/</loc></url><url><loc>https://moanju.org/tools/paper-tracker/</loc></url><url><loc>https://moanju.org/topics/</loc></url><url><loc>https://moanju.org/topics/ai-governance-policy/</loc></url><url><loc>https://moanju.org/topics/ai-safety-framework/</loc></url><url><loc>https://moanju.org/topics/ai-safety-standards/</loc></url><url><loc>https://moanju.org/topics/ai-safety-technology/</loc></url></urlset>