Screenshots must be clear, annotated, and consistently organized - Request/response pairs are essential for web application findings - Command output should be cleaned and annotated, never altered - Redact sensitive data but preserve vulnerability evidence