ArtifactsBonusFeedbackHours1.5TagsEngagement with red teams and security firms; Review of all victim and perpetrator addresses, blacklisting states, and movements offunds;