Credentials that are stored in clear text in memory or written to log files can be intercepted by a malicious actor.