Throughout this book, we've been formatting sample reports based on whatever vulnerability we've dived into. Ideally, you've gotten a sense of what information is important from the data points that frequently show up in those reports, but in this chapter, we'll go into greater detail about the most important submission components. We'll cover what increases the chance of receiving a reward, what can bump up the severity of your award (and its payout), what information is nice-but-optional, and then what's just noise. We'll also discuss the principles you can use to write reports with clear, easy-to-reproduce vulnerabilities, and detailed, compelling attack scenarios that will have the internal security team clamoring for a patch (triggering your reward).
Having a granular idea of the individual content, scenarios, and...