How to submit
- Target and affected version details
- Minimum reproduction checklist with exact steps
- Environment assumptions and prerequisites
- Observed impact and security relevance
- Evidence artifacts: logs, screenshots, trace output, or PoC notes
Submit via contact@del-sec.com. For sensitive content, encrypt using the PGP public key.