Please provide as much detail as possible, detailed descriptions of behaviours, and, if applicable, links to specific blocks of source code (especially in cases of malicious or abusive behaviour or vulnerabilities).
DO NOT include any PII or SPII in this form. If necessary, we will reach out separately to request that information.