<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.cremit.io/blog/vercel-april-2026-incident-nhi-secret-sprawl</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/14785e509c57d22dbc58558412282e39132b972e-1200x630.png</image:loc>
      <image:title>Vercel&apos;s April 2026 Incident Is a Textbook NHI Problem: What to Rotate and Why</image:title>
      <image:caption>Vercel confirmed an unauthorized-access incident on April 19, 2026 that started in a third-party AI tool, pivoted through Google Workspace, and reached environment variables in a s</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/out-of-scope-loophole-credential-exposure</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/3e425fe5a4987e73bed4866083b24733305c7c30-1200x630.png</image:loc>
      <image:title>The &quot;Out of Scope&quot; Loophole: Why Bug Bounties Look Away From Credential Exposure</image:title>
      <image:caption>An organization&apos;s core credentials sat in public repositories for years. The security industry&apos;s answer: &quot;Out of scope.&quot;</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/nhi-kill-chain-zombie-key</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/fabc43b4d2790ff668452a9a360f68e3ef115754-1200x630.png</image:loc>
      <image:title>Expired Credentials That Still Work: The Zombie Key Problem (NHI Kill Chain #5)</image:title>
      <image:caption>Secret scanning alert: Resolved. Credential status: Active. Deleting a secret from code is not the same as revoking it. Inside the Zombie Key kill chain.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/nhi-kill-chain-over-shared-key</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/c48ec8a4ac022136157a7a26048ef52ff3b5a81c-1200x630.png</image:loc>
      <image:title>Over-privileged API Keys: When One Credential Unlocks Too Much (NHI Kill Chain #4)</image:title>
      <image:caption>A single Stripe API key was copied to 14 locations over three years. When a QA repo went public, the key was exposed — and revoking it meant breaking 14 services simultaneously.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/nhi-kill-chain-aged-key</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/f6e582b5d868160a2c8b611a0c957b932998dcc6-1200x630.png</image:loc>
      <image:title>Unrotated API Keys: Why Years-Old Credentials Still Run Production (NHI Kill Chain #3)</image:title>
      <image:caption>A single AWS key, never rotated for 3 years, spread across 7 systems. When a supply chain attack hit a Terraform CI plugin, the key gave attackers full infrastructure access. Insid</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/nhi-kill-chain-shadow-key</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/90791932348f3b36c1c2bd1500246229d206c8dd-1200x630.png</image:loc>
      <image:title>Shadow Service Accounts: Detecting Undocumented Machine Identities (NHI Kill Chain #2)</image:title>
      <image:caption>A single production outage left credentials in six non-code platforms — Slack, Jira, Confluence, Sentry, Datadog, and PagerDuty. Your secret scanner found none of them. Inside the </image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/nhi-kill-chain-ghost-key</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/4fa791b6c14b0437adcc8ca7adbefb780c70c31b-1200x630.png</image:loc>
      <image:title>Orphaned API Keys: The Security Risk of Credentials With No Owner (NHI Kill Chain #1)</image:title>
      <image:caption>A departed developer&apos;s AWS key stayed active for 92 days. When an infostealer hit their personal laptop, the key was sold on the dark web. Inside the Ghost Key kill chain and how t</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/trivy-supply-chain-attack-kill-chain-analysis</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/0705a3c57569bea327c9cb2bd386f1634ae71828-1200x630.png</image:loc>
      <image:title>When the Security Scanner Became the Weapon — A Cyber Kill Chain Analysis of the Trivy Supply Chain Attack</image:title>
      <image:caption>Aqua Security&apos;s Trivy was compromised by TeamPCP, cascading into LiteLLM. A 7-phase Cyber Kill Chain and MITRE ATT&amp;CK analysis of how incomplete credential rotation turned a single</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/nhi-kill-chain-public-key</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/1cdc1de5daaaac1d5f7bb424a707cfcb9bb5515d-1200x630.png</image:loc>
      <image:title>Publicly Exposed API Keys: What Happens When Credentials Reach Open Repos (NHI Kill Chain #7)</image:title>
      <image:caption>A .env file pushed to a public GitHub repo is found by attacker bots in 4 minutes. We map the full kill chain — from credential exposure to infrastructure compromise and show how t</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/ai-supply-chain-attack-clinejection</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/f8d140c6b6b5f54629e791e3f42b61c07c0b964a-1200x630.png</image:loc>
      <image:title>How a Single GitHub Issue Title Compromised 4,000 Developer Machines</image:title>
      <image:caption>A prompt injection in a GitHub Issue title hijacked Cline&apos;s AI triage bot, stole npm tokens, and silently installed a rogue AI agent on 4,000 developer machines. The era of AI-inst</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/git-secret-scanning-complete-guide-for-2026</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/1228871e2242c0a8c31e997cae4fd61eeec5a5f4-2400x1260.png</image:loc>
      <image:title>Git Secret Scanning: Complete Guide for 2026</image:title>
      <image:caption>Complete guide to git secret scanning tools. Compare TruffleHog, GitGuardian, GitHub Advanced Security, and Cremit. Learn implementation strategies with real CI/CD examples</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/api-keys-traded-on-the-dark-web-hackers-new-targe</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/2315b8cb8f0755aff57be3e29373686e539e125b-2400x1260.png</image:loc>
      <image:title>API Keys Traded on the Dark Web: Hackers&apos; New Target</image:title>
      <image:caption>API Keys Traded on the Dark Web: Hackers&apos;s New Target</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/nx-supply-chain-attack-comprehensive-security-analysis-2025</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/09cee657601d666547af85eedf4f3a776caf7eea-2400x1260.png</image:loc>
      <image:title>Nx Package Supply Chain Attack: How a GitHub Actions Vulnerability Caused a Global Crisis</image:title>
      <image:caption>Attackers exploited a GitHub Actions vulnerability to compromise the Nx package. Analysis of the attack chain, who was affected, and how to detect similar threats.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/2025-cybersecurity-landscape-report</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/b2786ce037ef1fa5ad8725f147cf91a9e0f5503b-2400x1260.png</image:loc>
      <image:title>The 2025 Cybersecurity Landscape: Download the Full Report</image:title>
      <image:caption>The 2025 Cybersecurity Landscape: Download the Full Report</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/vercel-secret-exposure-case-study</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/3f3040cd1c8a0f14717fa6391e8ae860e59fbcea-2400x1260.png</image:loc>
      <image:title>Vercel Secret Exposure: 5 Real Cases and How to Prevent Them</image:title>
      <image:caption>We found live API keys in 0.45% of public Vercel deployments. AWS credentials, Stripe secrets, GitHub tokens. Here is what exposes them (NEXT_PUBLIC_ misuse is only one), how attac</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/owasp-nhi5-2025---overprivileged-nhi-in-depth-analysis-and-management</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/05f78c6b23b1fb3b8c23b459478e006f7e21e539-2400x1260.png</image:loc>
      <image:title>OWASP NHI5:2025 - Overprivileged NHI In-Depth Analysis and Management</image:title>
      <image:caption>OWASP NHI5:2025 - Overprivileged NHI In-Depth Analysis and Management</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/beyond-lifecycle-management-why-continuous-secret-detection-is-non-negotiable-for-nhi-security</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/b9cca04fa23fd8fd7048c0db8ee440bcc156d102-2400x1260.png</image:loc>
      <image:title>Beyond Lifecycle Management: Why Continuous Secret Detection is Non-Negotiable for NHI Security</image:title>
      <image:caption>Beyond Lifecycle Management: Why Continuous Secret Detection is Non-Negotiable for NHI Security</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/owasp-nhi-4-2025</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/6730cbd1240d1e9a2c2ebbc6dbd31e28956a0c50-2400x1260.png</image:loc>
      <image:title>OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans</image:title>
      <image:caption>OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/securing-your-software-pipeline-the-role-of-secret-detection</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/ffedb8327f057a8a97fb43843743fbca66f16923-2400x1260.png</image:loc>
      <image:title>CI/CD Pipeline Secret Detection: Preventing Credential Leaks in Build and Deploy</image:title>
      <image:caption>Where credentials leak in modern CI/CD pipelines, what to scan at each stage (pre-commit, build, deploy), and how to integrate secret detection without slowing delivery.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/navigating-the-expanding-ai-universe-deepening-our-understanding-of-mcp-a2a-and-the-imperative-of-non-human-identity-security</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/0d0f892afd08298ca36d9d5977acddd186268317-2400x1260.png</image:loc>
      <image:title>MCP and A2A: Why Non-Human Identity Security Matters in the AI Era</image:title>
      <image:caption>Model Context Protocol (MCP) and Agent-to-Agent (A2A) communication are redrawing the NHI security boundary. What changes when AI agents become first-class identities in your infra</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/stop-secrets-sprawl-shifting-left-for-effective-secret-detection</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/fc7e231f14005e93d8b3b7fe4f446028b2945a2a-2400x1260.png</image:loc>
      <image:title>Stop Secrets Sprawl: Shifting Left for Effective Secret Detection</image:title>
      <image:caption>Stop Secrets Sprawl: Shifting Left for Effective Secret Detection</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/hidden-dangers-why-detecting-secrets-in-s3-buckets-is-critical</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/e56ca3c7cc736fc8002ee61b59b9aac7dfd3918e-2400x1260.png</image:loc>
      <image:title>Hidden Dangers: Why Detecting Secrets in S3 Buckets is Critical</image:title>
      <image:caption>Hidden Dangers: Why Detecting Secrets in S3 Buckets is Critical</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/the-rising-cost-of-data-breaches-how-secret-detection-strengthens-cybersecurity</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/efaf87793ffa6981d11b63851e9855b892399c4e-2400x1260.png</image:loc>
      <image:title>Rising Data Breach Costs: Secret Detection&apos;s Role</image:title>
      <image:caption>Rising Data Breach Costs: Secret Detection&apos;s Role</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/human-vs-non-human-identity-key-differentiators</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/f20e4cb0c0cf606021df6ced0bc62070898138b1-2400x1260.png</image:loc>
      <image:title>Human vs. Non-Human Identity: The Key Differentiators</image:title>
      <image:caption>Human vs. Non-Human Identity: The Key Differentiators</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/a-wake-up-call-for-nhi-security-the-tj-actions-changed-files-compromise</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/192f340806fa2b598fd2be0d872425160f834022-2400x1260.png</image:loc>
      <image:title>Wake-Up Call: tj-actions/changed-files Compromised NHIs</image:title>
      <image:caption>Wake-Up Call: tj-actions/changed-files Compromised NHIs</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/behind-the-code-best-practices-for-identifying-hidden-secrets</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/7dce3d4f4f89f19980d60aafb95244cdffeab2f8-2400x1260.png</image:loc>
      <image:title>Behind the Code: Best Practices for Identifying Hidden Secrets</image:title>
      <image:caption>Behind the Code: Best Practices for Identifying Hidden Secrets</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/nhi1-2025-improper-offboarding-a-comprehensive-overview</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/f13d3981111f53c339762955daac0ae35ba49be5-2400x1260.png</image:loc>
      <image:title>OWASP NHI1:2025 Improper Offboarding- A Comprehensive Overview</image:title>
      <image:caption>OWASP NHI1:2025 Improper Offboarding- A Comprehensive Overview</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/stop-the-sprawl-introducing-cremits-aws-s3-non-human-identity-detection</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/7c0b5f5cab66cc893649f638ed9e4338a823b8ee-2400x1260.png</image:loc>
      <image:title>Stop the Sprawl: Introducing Cremit’s AWS S3 Non-Human Identity Detection</image:title>
      <image:caption>Stop the Sprawl: Introducing Cremit’s AWS S3 Non-Human Identity Detection</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/build-vs-buy-making-the-right-choice-for-secrets-detection</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/cb8f2bc5d8d31eabadaf5128c781216c895f573a-2400x1260.png</image:loc>
      <image:title>Build vs. Buy: Making the Right Choice for Secrets Detection</image:title>
      <image:caption>Build vs. Buy: Making the Right Choice for Secrets Detection</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/bybit-hacking-incident-analysis-how-to-strengthen-cryptocurrency-exchange-security</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/652569c1f13ff6b6b37ea005496bb073468d0444-2400x1260.png</image:loc>
      <image:title>Bybit Hack Analysis: Strengthening Crypto Exchange Security</image:title>
      <image:caption>Bybit Hack Analysis: Strengthening Crypto Exchange Security</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/nhi2-2025-secret-leakage---understanding-and-mitigating-the-risks</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/099e1551dfa298327e84fea9103ab2cd71722745-2400x1260.png</image:loc>
      <image:title>OWASP NHI2:2025 Secret Leakage – Understanding and Mitigating the Risks</image:title>
      <image:caption>OWASP NHI2:2025 Secret Leakage – Understanding and Mitigating the Risks</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/the-hidden-danger-in-your-supply-chain-understanding-nhi-threat-3---vulnerable-3rd-party-nhi</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/308fcae95d0a94bd0e5824b5faa5722fdfc7e982-2400x1260.png</image:loc>
      <image:title>OWASP NHI3:2025 - Vulnerable Third-Party NHI</image:title>
      <image:caption>OWASP NHI3:2025 - Vulnerable Third-Party NHI</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/essential-practices-protecting-non-human-identities</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/45f12231b63f2fd8350cff9865e9c016656bca2d-2400x1260.png</image:loc>
      <image:title>6 Essential Practices for Protecting Non-Human Identities</image:title>
      <image:caption>6 Essential Practices for Protecting Non-Human Identities</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/introducing-vigilant-ally</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/b9aa4db19b8299e056472bbb27dab6923988b68d-2400x1260.png</image:loc>
      <image:title>Vigilant Ally: Helping Developers Secure GitHub Secrets</image:title>
      <image:caption>Vigilant Ally: Helping Developers Secure GitHub Secrets</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/credential-leakage-risks-hiding-in-frontend-code</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/dd0055f1525052c7929cdaa1dbf5d4692242d152-2400x1260.png</image:loc>
      <image:title>Frontend API Key Leaks: How to Detect Keys in JS Bundles</image:title>
      <image:caption>JavaScript bundles and source maps routinely leak API keys that never should have reached the browser. Here is how the leak happens, how to find it, and how to stop it.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/cremit-joins-aws-saas-spotlight</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/59c49c2a0f170dd241bc1207430e9d2508665d02-2400x1260.png</image:loc>
      <image:title>Cremit Joins AWS SaaS Spotlight Program</image:title>
      <image:caption>Cremit Joins AWS SaaS Spotlight Program</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/secret-detection-probe</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/f02dc587d60d7abddd5fbe844f6c07cd7e7c9f6f-2400x1260.png</image:loc>
      <image:title>Introducing Probe! Cremit&apos;s New Detection Engine</image:title>
      <image:caption>Introducing Probe! Cremit&apos;s New Detection Engine</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/understanding-the-owasp-non-human-identities-nhi-top-10-threats</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/d441b2b2d9e22063921e38ecccfcf27473fbdb83-2400x1260.png</image:loc>
      <image:title>OWASP NHI Top 10 Explained: 10 Machine-Credential Risks Mapped</image:title>
      <image:caption>OWASP NHI Top 10 names the machine-credential risks most teams still do not track. Here is what each threat means, and how each maps to real controls you can deploy.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/devsecops-why-start-with-cremit</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/369f26ad44cd72c666e0a97ddf26fb7529f487fd-2400x1260.png</image:loc>
      <image:title>DevSecOps: Why start with Cremit</image:title>
      <image:caption>DevSecOps: Why start with Cremit</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/enlighten-interview</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/bf6584725551a9288e50aa944a851d4edd683e22-2400x1260.png</image:loc>
      <image:title>Customer Interview: Insights from ENlighten</image:title>
      <image:caption>Customer Interview: Insights from ENlighten</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/what-is-secret-detection-a-beginners-guide-to-securing-sensitive-information</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/5d7239da9769b55a94d9b6777c8f662718c71cff-2400x1260.png</image:loc>
      <image:title>What Is Secret Detection? A Beginner’s Guide</image:title>
      <image:caption>What Is Secret Detection? A Beginner’s Guide</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/microsoft-leaked-secrets</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/7ae9bff88dcc1ab548ad8954baf97e6b96fcc7bd-2400x1260.png</image:loc>
      <image:title>Microsoft Secrets Leak: A Cybersecurity Wake-Up Call</image:title>
      <image:caption>Microsoft Secrets Leak: A Cybersecurity Wake-Up Call</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/secret-sprawl-and-non-human-identities-the-growing-security-challenge</loc>
    <image:image>
      <image:loc>https://cdn.sanity.io/images/iwjcunsj/production/036d9e3cff96f3a201e51fb8857242f4dd356b58-2400x1260.png</image:loc>
      <image:title>Secret Sprawl and Non-Human Identities: The Growing Security Challenge</image:title>
      <image:caption>Secret Sprawl and Non-Human Identities: The Growing Security Challenge</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations/slack-alarm</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/slack-alarm/opengraph-image</image:loc>
      <image:title>Slack — Cremit integration</image:title>
      <image:caption>Send detection alerts to a Slack channel via OAuth-installed Argus app.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations/webhook</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/webhook/opengraph-image</image:loc>
      <image:title>Webhook — Cremit integration</image:title>
      <image:caption>POST JSON payloads to any HTTPS endpoint. Works with PagerDuty, Opsgenie, Discord, and custom SOAR.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations/telegram</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/telegram/opengraph-image</image:loc>
      <image:title>Telegram — Cremit integration</image:title>
      <image:caption>Deliver alerts to a Telegram channel or group via bot token.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations/aws-cloudformation</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/aws-cloudformation/opengraph-image</image:loc>
      <image:title>AWS (CloudFormation) — Cremit integration</image:title>
      <image:caption>Deploy a read-only analyzer via CloudFormation to map IAM permissions attached to discovered AWS credentials.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations/gcp-service-account</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/gcp-service-account/opengraph-image</image:loc>
      <image:title>GCP (Service Account) — Cremit integration</image:title>
      <image:caption>Connect a read-only service account to map IAM bindings and roles on discovered GCP credentials.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations/github</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/github/opengraph-image</image:loc>
      <image:title>GitHub — Cremit integration</image:title>
      <image:caption>Scan repositories, commit history, and issues for exposed secrets across your GitHub organization.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations/gitlab</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/gitlab/opengraph-image</image:loc>
      <image:title>GitLab — Cremit integration</image:title>
      <image:caption>Scan self-hosted or SaaS GitLab projects, commit history, and issues for credential exposure.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations/aws-s3</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/aws-s3/opengraph-image</image:loc>
      <image:title>AWS S3 — Cremit integration</image:title>
      <image:caption>Scan S3 buckets for credentials, API keys, and tokens stored in object storage.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations/google-drive</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/google-drive/opengraph-image</image:loc>
      <image:title>Google Drive — Cremit integration</image:title>
      <image:caption>Scan documents, spreadsheets, and shared drives for pasted credentials, API keys, and tokens.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations/jira</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/jira/opengraph-image</image:loc>
      <image:title>Jira — Cremit integration</image:title>
      <image:caption>Scan Jira issue descriptions, comments, and attachments for pasted credentials.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations/confluence</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/confluence/opengraph-image</image:loc>
      <image:title>Confluence — Cremit integration</image:title>
      <image:caption>Scan Confluence pages, templates, and attachments for credentials stored in documentation.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations/notion</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/notion/opengraph-image</image:loc>
      <image:title>Notion — Cremit integration</image:title>
      <image:caption>Scan Notion workspace pages and databases for pasted API keys, tokens, and credentials.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations/slack-scan</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/slack-scan/opengraph-image</image:loc>
      <image:title>Slack (Messages) — Cremit integration</image:title>
      <image:caption>Scan Slack channels and DMs for pasted credentials, API keys, and tokens.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations/scim-okta</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/scim-okta/opengraph-image</image:loc>
      <image:title>Okta SCIM — Cremit integration</image:title>
      <image:caption>Auto-provision and de-provision Argus users from Okta groups. Handles onboarding and offboarding.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations/scim-google-workspace</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/scim-google-workspace/opengraph-image</image:loc>
      <image:title>Google Workspace SCIM — Cremit integration</image:title>
      <image:caption>Sync Google Workspace users and groups to Argus. Automatic access removal when accounts are suspended.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations/saml-sso</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/saml-sso/opengraph-image</image:loc>
      <image:title>SAML 2.0 — Cremit integration</image:title>
      <image:caption>Authenticate users through your SAML 2.0 IdP (Okta, Azure AD, Google Workspace, Ping, etc.).</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/integrations</loc>
    <image:image>
      <image:loc>https://www.cremit.io/integrations/opengraph-image</image:loc>
      <image:title>Cremit Argus Integrations</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cremit.io/blog/series/nhi-kill-chain</loc>
    <image:image>
      <image:loc>https://www.cremit.io/blog/series/nhi-kill-chain/opengraph-image</image:loc>
      <image:title>NHI Kill Chain Series</image:title>
    </image:image>
  </url>
</urlset>