Whether you're writing for a technical audience or a general one, keep these principles in mind:
: Give it a clear, descriptive name (e.g., "Authentication Bypass via Archive Path Traversal").
: Keep descriptions tight and to the point. Long-winded explanations can bury the most important facts.
: Use short sentences (under 20 words) and bullet points to make the information easy to digest at a glance.
: Used by security researchers to analyze if other files are hidden inside the archive.
: Use a standard scale like CVSS to show how serious the issue is.
: Essential if the write-up involves recovering a lost password for the archive.