
  <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
      <title>Blog - Shellvoide | Bridging voids in Enterprise Security | Certified Cybersecurity Services</title>
      <link>https://shellvoide.com/blog/blog</link>
      <description>Welcome to our blog. Here we share our thoughts and insights on cybersecurity, technology, and more. You can get in touch with us for any cybersecurity needs at info@shellvoide.com</description>
      <language>en-us</language>
      <managingEditor>info@shellvoide.com (Shellvoide)</managingEditor>
      <webMaster>info@shellvoide.com (Shellvoide)</webMaster>
      <lastBuildDate>Thu, 23 Apr 2026 00:00:00 GMT</lastBuildDate>
      <atom:link href="https://shellvoide.com/blog/tags/autonomous-security/feed.xml" rel="self" type="application/rss+xml"/>
      
  <item>
    <guid>https://shellvoide.com/blog/blog/klue-61-minute-ai-pentest-case-study</guid>
    <title>Inside a 61 Minute Pentest: How KLUE Found 11 Critical Flaws in a Public Sector Web Application</title>
    <link>https://shellvoide.com/blog/blog/klue-61-minute-ai-pentest-case-study</link>
    <description>A case study from an autonomous AI pentest run by KLUE. Eleven confirmed findings in just over an hour, including a blind SQL injection that led to full database takeover. A practitioner walkthrough of the discoveries, the methodology, and the takeaways.</description>
    <pubDate>Thu, 23 Apr 2026 00:00:00 GMT</pubDate>
    <author>info@shellvoide.com (Shellvoide)</author>
    <category>ai-pentesting</category><category>sql-injection</category><category>cors</category><category>case-study</category><category>klue</category><category>ptaas</category><category>authorization-bypass</category><category>appsec</category><category>pentesting</category><category>autonomous-security</category>
  </item>

    </channel>
  </rss>
