<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>AI Attacks</title><description>Working AI red team techniques from the practitioner trenches. Attack patterns, tooling, scoping methodology, and reproducible PoCs against deployed LLMs and agents — sourced from real engagements and primary research, not vendor decks.</description><link>https://aiattacks.dev/</link><language>en</language><item><title>What this site is for</title><link>https://aiattacks.dev/posts/welcome/</link><guid isPermaLink="true">https://aiattacks.dev/posts/welcome/</guid><description>AI Attacks covers offensive AI security from a working practitioner&apos;s perspective. Here&apos;s what we publish.</description><pubDate>Sun, 03 May 2026 00:00:00 GMT</pubDate><category>meta</category><author>AI Attacks Editorial</author></item></channel></rss>