How to Present Your Findings
Choosing between submitting single or multiple reports
How to adequately explain and prove your findings
How to format your report
## Summary
(Provide a brief overview of the vulnerability.)
## Vulnerability Details
(Delve deep and elaborate on the identified issue, including where it exists in the codebase.)
## Impact
(Describe the potential consequences of this vulnerability. How could it harm the protocol or users?)
## Tools Used
(List any tools or software that aided in the identification of the vulnerability.)
## Recommended Mitigation
(Suggest ways to resolve or mitigate the identified vulnerability.)Last updated