Problem Statement
What is the most responsible way to handle discovered credentials post-exploitation?
Explanation
Credentials are sensitive. Minimize viewing, store proofs securely, and limit any use to agreed test accounts or steps in scope.
Code Solution
SolutionRead Only
evidence.log: time, source, redacted_credential_hash, scope_id
