<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.preamble.com/template-info/styleguide</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/checkout</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/paypal-checkout</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/order-confirmation</loc>
    </url>
    <url>
        <loc>https://www.preamble.com</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/about-us</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/pricing</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/media</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/contact</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/template-info/changelog</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/template-info/licenses</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/template-info/instruction</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/partner</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/platform</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/prompt-injection-a-critical-vulnerability-in-the-gpt-3-transformer-and-how-we-can-begin-to-solve-it</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/ibm-watsonx-and-preamble-integration</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/ai-roi-calculator</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/services</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/2025-owasp-top-10-llm</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/5-years-of-defending-ai-and-the-vulnerability-class-that-reshaped-the-industry</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/beyond-engagement-aligning-algorithmic-recommendations-with-prosocial-goals</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/cooperatively-learning-human-values</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/declassifying-the-responsible-disclosure-of-the-prompt-injection-attack-vulnerability-of-gpt-3</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/exploiting-along-the-promptware-kill-chain-ai-red-teaming</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/making-middleware-work</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/navigating-the-ai-safety-and-security-product-landscape</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/preamble-adds-new-al-security-platform-offerings-including-free-tools-to-identify-shadow-al-use-and-potential-breaches</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/preamble-announces-participation-in-department-of-commerce-consortium-dedicated-to-ai-safety</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/preamble-assessed-awardable-for-department-of-defense-work-in-the-cdaos-tradewinds-solutions-marketplace</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/preamble-secures-comprehensive-patent-for-pioneering-ai-security-technology</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/preambles-human-centric-approach-to-aligning-ai</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/responsible-disclosure-of-ai-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/secure-ai-in-fintech-2025-the-compliance-conundrum</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/shadow-ai-detection</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/tooljack-hijacking-an-ai-agents-perception-through-bridge-protocol-exploitation</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/who-is-this-agent-the-ai-identity-crisis</loc>
    </url>
    <url>
        <loc>https://www.preamble.com/blogs/your-last-pen-test-is-already-obsolete-heres-why</loc>
    </url>
</urlset>