<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Vindicara AIR Blog</title>
    <link>https://vindicara.io/blog</link>
    <atom:link href="https://vindicara.io/rss.xml" rel="self" type="application/rss+xml" />
    <description>Forensic reconstruction and incident response for AI agents. Research, compliance guides, and engineering deep-dives from the team behind Project AIR.</description>
    <language>en-us</language>
    <lastBuildDate>Sat, 18 Apr 2026 00:00:00 GMT</lastBuildDate>
    <item>
      <title>Run your first `air trace` in 5 minutes</title>
      <link>https://vindicara.io/blog/secure-ai-agents-5-minutes</link>
      <guid isPermaLink="true">https://vindicara.io/blog/secure-ai-agents-5-minutes</guid>
      <pubDate>Sat, 18 Apr 2026 00:00:00 GMT</pubDate>
      <category>Quickstart</category>
      <description>From pip install projectair to a signed forensic timeline of your LangChain agent in under five minutes. The air CLI and airsdk are MIT-licensed and open source today.</description>
    </item>
    <item>
      <title>EU AI Act Article 72: A Developer&apos;s Guide to Post-Market Monitoring</title>
      <link>https://vindicara.io/blog/eu-ai-act-article-72-guide</link>
      <guid isPermaLink="true">https://vindicara.io/blog/eu-ai-act-article-72-guide</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <category>Compliance</category>
      <description>The enforcement deadline is August 2, 2026. Article 72 requires continuous post-market monitoring for high-risk AI systems. Here is what your engineering team needs to build, and how to automate most of it.</description>
    </item>
    <item>
      <title>The State of MCP Security in 2026</title>
      <link>https://vindicara.io/blog/mcp-security-2026</link>
      <guid isPermaLink="true">https://vindicara.io/blog/mcp-security-2026</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <category>Research</category>
      <description>92% of MCP servers lack proper OAuth. We scanned real configurations and found critical vulnerabilities across authentication, authorization, and resource management.</description>
    </item>
  </channel>
</rss>
