diff --git a/.github/pull_request_template.md b/.github/pull_request_template.md
new file mode 100644
index 00000000..2b51ab46
--- /dev/null
+++ b/.github/pull_request_template.md
@@ -0,0 +1,28 @@
+## Goal
+
+
+## Changes
+
+-
+-
+-
+
+## Testing
+
+- [ ] Application runs locally
+- [ ] Commands executed successfully
+- [ ] Documentation reviewed for accuracy
+
+## Artifacts & Screenshots
+
+- Screenshots:
+ -
+ -
+
+---
+
+### Checklist
+- [ ] PR title is clear and descriptive
+- [ ] Documentation updated (if applicable)
+- [ ] No secrets, credentials, or large temporary files committed
+
diff --git a/labs/submission1.md b/labs/submission1.md
new file mode 100644
index 00000000..dbb1ccc3
--- /dev/null
+++ b/labs/submission1.md
@@ -0,0 +1,41 @@
+# Triage Report — OWASP Juice Shop
+
+## Scope & Asset
+- Asset: OWASP Juice Shop (local lab instance)
+- Image: bkimminich/juice-shop:v19.0.0
+- Release link/date: —
+- Image digest (optional):
+
+## Environment
+- Host OS: NixOS 26.05 (Yarara) x86_64
+- Docker: 29.1.5
+
+## Deployment Details
+- Run command used: `docker run -d --name juice-shop -p 127.0.0.1:3000:3000 bkimminich/juice-shop:v19.0.0`
+- Access URL: http://127.0.0.1:3000
+- Network exposure: 127.0.0.1 only [x] Yes [ ] No
+
+## Health Check
+- Page load: 
+- API check: first 5–10 lines from `curl -s http://127.0.0.1:3000/rest/products | head`
+
+## Surface Snapshot (Triage)
+- Login/Registration visible: [x] Yes [ ] No — notes: Login is visible under Account button on a page header
+- Product listing/search present: [x] Yes [ ] No — notes: Products are displayed
+- Admin or account area discoverable: [x] Yes [ ] No
+- Client-side errors in console: [ ] Yes [x] No — notes: no errors are leaked
+- Security headers (quick look — optional): `curl -I http://127.0.0.1:3000` → CSP/HSTS present? notes: Basic security headers present but missing CSP and HSTS headers
+
+## Risks Observed (Top 3)
+1) Missing Content Security Policy (CSP) --
+ Application lacks CSP headers, making it vulnerable to XSS attacks as there are no restrictions on script sources or inline execution.
+2) No HTTP Strict Transport Security (HSTS) --
+ Absence of HSTS headers leaves the application susceptible to SSL stripping attacks and protocol downgrades.
+3) Exposed Admin Interface --
+ Administrative endpoints are discoverable without proper rate limiting or multi-factor authentication, potentially allowing brute force attacks.
+
+
+## GitHub Community
+
+Starring repositories helps signal project quality and usefulness, supports maintainers through visible appreciation, and improves discoverability of valuable open-source tools. Following developers makes it easier to track relevant work, learn from others’ approaches, and build professional connections that support effective collaboration and long-term career growth.
+
diff --git a/labs/submission1/page-load.png b/labs/submission1/page-load.png
new file mode 100644
index 00000000..af73e664
Binary files /dev/null and b/labs/submission1/page-load.png differ