Include enough information for quick and accurate triage:
- The desktop app version, operating system, and affected component (or website endpoint, where applicable).
- A short vulnerability classification (for example, XSS).
- Step-by-step benign, non-destructive proof-of-concept steps.
- Impact context to support severity assessment.