: Be as descriptive as possible without including things that belong in the formal specification.

: Describe the vulnerability found in the zip handling, such as a PHP wrapper exploit .

: Explain what the current situation is and why your specific change or data in LJJ2.zip is needed.

: Mention that you are seeking feedback, as the Zcash Community Forum is a key place for refining these documents. 4. The Cybersecurity "Walkthrough" (CTF/OSCP)

If this is a write-up for a security challenge or a "box" like those on Hack The Box (HTB), use a narrative style: