<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://harshitrathod.com/</loc></url><url><loc>https://harshitrathod.com/about/</loc></url><url><loc>https://harshitrathod.com/blog/</loc></url><url><loc>https://harshitrathod.com/blog/2026/04/claude-mythos-alignment-welfare-system-card/</loc></url><url><loc>https://harshitrathod.com/blog/2026/04/claude-mythos-cybersecurity-capabilities/</loc></url><url><loc>https://harshitrathod.com/blog/category/ai/</loc></url><url><loc>https://harshitrathod.com/blog/tag/ai-safety/</loc></url><url><loc>https://harshitrathod.com/blog/tag/alignment/</loc></url><url><loc>https://harshitrathod.com/blog/tag/claude-mythos/</loc></url><url><loc>https://harshitrathod.com/blog/tag/cybersecurity/</loc></url><url><loc>https://harshitrathod.com/blog/tag/interpretability/</loc></url><url><loc>https://harshitrathod.com/blog/tag/model-welfare/</loc></url><url><loc>https://harshitrathod.com/blog/tag/project-glasswing/</loc></url><url><loc>https://harshitrathod.com/blog/tag/responsible-ai/</loc></url><url><loc>https://harshitrathod.com/blog/tag/vulnerability-research/</loc></url></urlset>