Zsh is fast, flexible, and powerful. But like any shell, it can expose sensitive information—names, emails, Social Security numbers, credit card data—if configured without care. PII data in Zsh can enter logs, history files, prompts, or output when commands handle unmasked datasets. One careless echo, one unfiltered API