ArtifactsBonusFeedbackHours4TagsMore research and analysis on use-after-free vulnerabilities and their potential impact on extension manipulation and private key safety; More network traffic analysis