Report through your organization's security channels
Do not publicly disclose vulnerabilities
Follow established responsible disclosure protocols
Submit detailed information to authorized security teams
Maintain operational security throughout the process
Never test exploits in operational environments or share vulnerability information through unauthorized channels.