and seconds there is only one output.
So if the puzzle creator were to spend a few satoshis from puzzle 130, you could solve the key by having the second transaction output + the existing partial WIF/key? Can you explain how do you find leakage of private key from second outputs?
It is possible that there is some way to use lattice attacks to reduce the problem when there are multiple signatures, but it is a different and more difficult problem than the more well known lattice attack against weak nonces, since in this case it would be assumed the nonces are not weak.