and seconds there is only one output.
So if the puzzle creator were to spend a few satoshis from puzzle 130, you could solve the key by having the second transaction output + the existing partial WIF/key? Can you explain how do you find leakage of private key from second outputs?