{"id":"d3d4e4fa-2fce-42bf-839c-bd8852e4c910","timestamp":1774965926517,"matcher":{"static":{"/__nuxt_content/blog/sql_dump.txt":{"prerender":true}},"wildcard":{},"dynamic":{}},"prerendered":["/","/ueber-mich","/impressum","/datenschutz","/kontakt","/blog/cyber-resilience-act-compliance","/blog/owasp-security-champion","/blog/cra-software-sicherheit","/ai-governance","/sichere-softwareentwicklung","/speaking","/ai-security","/cyber-resilience-act","/leistungen","/enterprise-architektur","/themen","/blog/ssdlc","/blog","/blog/shadow-ai","/blog/ai-angriffe-2025","/blog/prompt-injection","/blog/llm-security","/blog/risk-assessment","/blog/nis2-ki","/blog/eu-ai-act","/blog/ai-policy","/blog/api-security","/blog/security-framework","/blog/dsgvo-llm","/blog/data-privacy","/blog/nhi-management","/blog/deployment","/blog/llm-integration"]}