<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://sherlock.xyz</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/solutions/collaborative-audits</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/solutions/ai</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/solutions/audit-contests</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/solutions/bug-bounties</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/solutions/sherlock-shield</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/blog</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/contact</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/lifecycle-ebook</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/about</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/podcast</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/referral-program</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/brand-kit</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/case-studies</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/5-steps-to-becoming-a-top-level-smart-contract-auditor</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/8-steps-to-secure-a-smart-contract-for-launch-in-2026</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/a-complete-guide-to-solidity-security-audits-for-web3-protocols</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/a-model-codebase-flying-tulips-launch-and-sherlock-audit-contest</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/agentic-ai-security-risks-in-web3-what-protocols-need-to-know-in-2026</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/ai-smart-contract-auditing-in-web3-how-it-works-who-its-for-and-why-it-matters</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/are-we-in-a-crypto-bear-market-march-2026-market-pulse</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/audit-your-own-smart-contract-before-hiring-an-auditor-2026-guide</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/best-blockchain-to-build-on-in-2026</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/best-web3-bug-bounties-in-2026-the-highest-paying-programs-on-every-platform</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/case-study-perennial</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/centrifuge-sherlock-ai-continuous-security-in-the-development-workflow</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/controlled-benchmark-chatgpt-and-claude-vs-sherlock-ai</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/cross-chain-security-in-2026</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/ethereum-foundation-security-team-x-sherlock</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/gmx-exchange-hack-explained</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/how-did-my-audit-go---a-framework-for-evaluating-audit-effectiveness</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/how-sherlock-ai-uncovered-a-2m-vulnerability-before-launch</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/how-to-build-an-ai-agent-that-pays-with-usdc</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/how-to-build-an-ai-agent-token-the-dos-and-donts</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/how-to-choose-the-best-auditor-2026</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/how-to-launch-a-crypto-token-in-2026-the-complete-playbook</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/how-to-start-a-web3-company-in-2026</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/how-to-use-claude-cowork-for-web3-development</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/how-to-write-skills-for-claude-code-and-cowork</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/inside-the-lab-berndt-on-the-sherlock-ai-v2-upgrade</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/institutional-crypto-adoption-in-2026-whos-actually-moving-in</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/introducing-berndt-sherlocks-newest-ai-researcher</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/introducing-sherlock-ai</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/introducing-sherlock-ai-v2</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/introducing-sherlock-ai-v2-2</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/introducing-the-2026-sherlock-referral-program</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/major-stablecoin-protocol-in-2026-the-full-market-landscape</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/morpho-vaults-v2-blackthorn-audit-for-an-immutable-vault-standard</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/rust-security-auditing-guide-2026</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/sherlock-ai-update-may-2026</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/sherlock-web3-auditing-2026-security-overview-methods-and-clients</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/sherlocks-collaborative-auditing-system-achieves-results</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/smart-contract-audit-cost</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/smart-contract-audit-pricing-a-market-reference-for-2026</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/smart-contract-audit-the-complete-process-from-scoping-to-secure-deployment</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/stablecoin-security-audits-in-2026-what-teams-verify-before-launch</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/the-2025-sherlock-watson-awards</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/the-biggest-lessons-10-security-leaders-taught-us-on-season-1-of-the-web3-security-podcast</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/the-complete-web3-protocol-index-for-2026-every-major-project-by-vertical</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/the-sherlock-web3-security-report-q1-2026-every-major-hack-exploit-and-trends</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/the-top-10-most-threatening-vulnerabilities-in-web3-protocols-10-integer-overflow-underflow</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/the-top-5-reasons-to-integrate-ai-auditing-into-your-development-workflow</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/top-10-best-smart-contract-auditing-companies-in-2026</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/top-web3-security-threats-opsec-best-practices-for-2026</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/understanding-critical-high-medium-and-low-vulnerabilities-in-smart-contracts</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/understanding-the-insecure-randomness-vulnerability</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/vulnerability-analysis-numa</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/web3-bug-bounty-programs-explained-continuous-protection-for-defi-protocols</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/web3-funding-index-q1-2026---sherlock-research-report</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/web3-security-101-what-is-the-difference-between-bug-bounties-and-audit-contests</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/web3-security-in-2026-lessons-from-2025-projections-ahead</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/web3-security-systems-explained-every-major-approach-compared</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/what-is-a-ciso-in-web3</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/what-is-a-flashloan-attack</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/what-is-collaborative-smart-contract-auditing</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/what-is-formal-verification</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/what-is-fuzzing-in-web3-security-a-high-level-overview</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/what-is-sherlock-an-explainer-for-builders-and-teams</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/what-is-smart-contract-auditing</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/what-is-the-clarity-act-april-2026-update</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/when-audits-go-head-to-head</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/why-careful-validation-matters-a-vulnerability-originating-in-inline-assembly</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/post/x402-explained-the-http-402-payment-protocol</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/case-studies/aave</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/case-studies/autofinance</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/case-studies/centrifuge</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/case-studies/ethereumfoundation</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/case-studies/morpho</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/case-studies/perennial</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/podcast/centrifuges-serial-audits-6-security-reviews-that-reshaped-rwa-architecture-jeroen-offerijns</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/podcast/coinbases-auditing-standards-with-shashank-agrawal</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/podcast/cosmos-labs-3-pivots-in-6-months-timeboxing-experiments-to-find-pmf-barry-plunkett</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/podcast/ethereum-foundations-path-to-10-000-tps-and-bitcoins-51-attack-risk-justin-drake</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/podcast/fredrik-svantes-ethereum-foundation-podcast</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/podcast/how-solana-achieved-2-years-uptime-after-launching-with-3m-matt-sorg-solana-foundation</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/podcast/how-to-secure-70-billion-in-defi-aaves-approach-to-web3-security-w-ernesto-boado</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/podcast/polygon-labs-two-team-security-structure-where-most-web3-breaches-actually-start-mudit-gupta</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/podcast/safes-60b-security-stack-formal-verification-audits-and-1m-bounties-richard-meissner</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/podcast/securing-23-billion-in-restaked-assets-with-anto-joseph-principal-security-engineer-at-eigen-labs</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/podcast/skys-context-building-approach-six-months-to-zero-finding-audits-deniz-yilmaz-jq47c</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/podcast/step-multisig-process-protecting-billions-chris-von-hessert</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/podcast/validator-sniping-how-to-harvest-ip-addresses-to-redirect-mev-sebastian-burgel-gnosis</loc>
    </url>
    <url>
        <loc>https://sherlock.xyz/podcast/web3-security-podcast-dc-builder-research-engineer-at-world-foundation</loc>
    </url>
</urlset>