Risk: Sensitive data exposed through poor implementation. Educational demonstration of data exposure patterns and prevention techniques.
Mitigate sensitive data leaks by encrypting in transit and at rest, securing secrets, and limiting exposure via caching and logging.
Audit a demo app for leaks, add crypto and secret management, and verify with tests.
Apply least data principles: collect less, store shorter, and protect everywhere.