Thanks to the researchers who report. Names listed with consent.
Find a security issue in scope, disclose it responsibly, and you'll be listed here with credit — if you want it.