<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.hopper.security</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/about</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/demo</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/blog</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/uncovering-shaded-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/platform</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/compare/hopper-vs-runtime-sca</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/compare/hopper-vs-traditional-sca</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/compare/hopper-vs-modern-sca</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/exploitable-vulnerability-remediation</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/search</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/ai-as-a-design-partner-not-a-replacement</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/asp-net-precision-reachability-for-the-microsoft-stack</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/beyond-packages-precision-with-function-level-reachability</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/blog-reachability-in-appsec-types-benefits-limits</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/brighten-your-workflow-hopper-now-supports-light-mode</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/bringing-visibility-to-ai-model-usage</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/exploitability-verification</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/eyes-wide-open-building-hopper-in-a-crowded-market</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/fedramp-rfc-0012-is-redefining-vulnerability-management-strategy</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/fifty-shades-of-jar-a-love-story-between-devs-and-cves</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/fortune-500-org-cuts-vulnerability-noise-by-99-with-hopper</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/from-134-vulnerabilities-to-3-real-risks</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/function-level-reachability-for-containers</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/good-vibes-bad-code-vibe-coding-and-how-to-secure-it-with-hopper</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/hopper-launches-four-ai-powered-appsec-products-for-the-age-of-modern-software</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/hopper-maintains-soc-2-type-ii-and-iso-27001-certifications</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/hopper-recognized-for-innovation-and-growth-in-2025</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/how-hopper-builds-fix-plans-developers-actually-use</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/hpe-cuts-through-noise-and-saves-1-4m-with-hopper</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/internal-libraries-the-most-overlooked-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/meet-grace-hoppers-ai-powered-mcp-server-for-open-source-security</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/mesh-escaped-dependency-hell-and-achieved-70-backlog-reduction-with-hopper</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/out-of-stealth-into-the-future-of-open-source-security</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/quieting-the-noise-with-thoughtful-branding-and-design</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/reducing-risk-accelerating-innovation-lessons-from-hopper-customers</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/sca-vs-sast</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/spring-evidence-based-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/the-first-accurate-vulnerability-analysis-for-django-applications</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/the-hopper-bitbucket-app-secure-your-open-source-dependencies-with-function-level-precision</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/the-real-roi-of-function-level-reachability</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/vulnerability-insights-cutting-through-the-noise-of-monorepos</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/vulnerability-noise-tax</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/post/why-hopper-is-whats-next-for-sca</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/policy/data-processing-agreement</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/policy/end-user-saas-agreement</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/policy/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/ai-inventory-managing-risk-from-ai-generated-and-imported-models</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/ai-risk-analysis-discovering-model-dependencies-and-managing-oss-exposure</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/aws-ecr-integration-settings</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/centralized-vulnerability-inventory-search-filter-and-export</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/custom-registry-and-integration-with-docker-hub</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/gitlab-registry-integration-settings</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/hopper-azure-devops-integration-documentation</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/hopper-bitbucket-server-integration-documentation</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/hopper-github-integration-documentation</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/hopper-gitlab-integration-documentation</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/hopper-jfrog-integration-documentation</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/managing-projects-and-applications-filtering-tagging-and-search-best-practices</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/navigating-the-hopper-dashboard</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/select-repositories-and-images</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/set-up-container-scanning</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/setup-onboarding</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/setup-sign-up-for-hopper</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/supported-languages-and-package-managers-in-hopper</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/taking-action-on-vulnerabilities-ignore-fix-or-file-a-jira-ticket</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/docs/vulnerability-insights-how-to-identify-and-act-on-low-effort-high-risk-issues</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/case-studies/fortune-500-org-cuts-vulnerability-noise-by-99-with-hopper</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/case-studies/hpe-cuts-through-noise-and-saves-1-4m-with-hopper</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/use-cases/ai-appsec-suite</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/use-cases/container-scanning</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/use-cases/function-level-reachability</loc>
    </url>
    <url>
        <loc>https://www.hopper.security/use-cases/license-scanning</loc>
    </url>
</urlset>