It starts with a late-night production fix. An engineer jumps into Teleport, opens a session, and scrolls through logs packed with sensitive data. One command later, an internal secret flashes on-screen. No breach report, but everyone knows how close that was. This is the messy reality of infrastructure access, and