Report security vulnerabilities for triage and remediation
Collect detailed bug reports from users
Submit requests for system or infrastructure changes
Request access to systems, tools, or environments