<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
    <url>
        <loc>https://graphnodesoftware.com/</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/about</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/careers</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/comparisons</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/contact</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/cookie-policy</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/docs</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/partners</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/privacy</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/request-demo</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/security</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/security-insights-report</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/terms</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/command-injection</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/dast-vs-pen-testing</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/iac-scanning-explained</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/idor-insecure-direct-object-reference</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/jwt-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/log4shell-and-the-supply-chain-lesson</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/nosql-injection</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/path-traversal-attack-explained</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/prototype-pollution</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/reducing-false-positives-sast</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/sast-vs-dast</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/sast-vs-iast-vs-dast</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/security-gates-cicd</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/server-side-template-injection-ssti</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/ssrf-attack-prevention</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/stored-vs-reflected-xss</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/transitive-dependencies-attack-surface</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/what-is-slsa</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/why-data-flow-analysis-matters</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/blog/xxe-xml-external-entity</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/comparisons/checkmarx-vs-sonarqube</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/comparisons/graphnode-vs-black-duck</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/comparisons/graphnode-vs-checkmarx</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/comparisons/graphnode-vs-fortify</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/comparisons/graphnode-vs-snyk</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/comparisons/graphnode-vs-sonarqube</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/comparisons/graphnode-vs-veracode</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/comparisons/snyk-alternatives</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/comparisons/veracode-vs-sonarqube</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/docs/administration</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/docs/audit-triage</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/docs/integrations</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/docs/reporting</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/docs/scanning</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/docs/user-management</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/api-security-testing</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/application-security</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/aspm</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/cnapp-cloud-application-security</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/container-security</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/dast-explained</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/devsecops-tools</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/nist-ssdf-800-218</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/owasp-top-10</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/sast-tools</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/sbom</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/sca-scan</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/sca-tools</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/secret-scanning</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/static-analysis</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/products/developer-edition</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/products/sast</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/products/sca</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/resources/documentation</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/resources/whitepapers</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/solutions/financial-services</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/solutions/government</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/solutions/healthcare</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/solutions/retail</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/owasp-top-10/a01-broken-access-control</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/owasp-top-10/a02-cryptographic-failures</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/owasp-top-10/a03-injection</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/owasp-top-10/a04-insecure-design</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/owasp-top-10/a05-security-misconfiguration</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/owasp-top-10/a06-vulnerable-and-outdated-components</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/owasp-top-10/a07-identification-and-authentication-failures</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/owasp-top-10/a08-software-and-data-integrity-failures</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/owasp-top-10/a09-security-logging-and-monitoring-failures</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/owasp-top-10/a10-server-side-request-forgery</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/static-analysis/cpp</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/static-analysis/csharp</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/static-analysis/java</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/static-analysis/javascript</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/static-analysis/kotlin</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/static-analysis/objective-c</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/static-analysis/php</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/static-analysis/python</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/static-analysis/swift</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/static-analysis/typescript</loc>
    </url>
    <url>
        <loc>https://graphnodesoftware.com/guides/static-analysis/vbnet</loc>
    </url>
</urlset>
<!-- XML Sitemap generated by @nuxtjs/sitemap v6.1.5 at 2026-04-27T18:34:04.640Z -->