Non-human identities—service accounts, API keys, machine-to-machine tokens—operate without human oversight. They run silently, triggering automated tasks, processing data, and talking to systems at scale. When these identities have debug logging access, the risk profile changes. Debug logs expose internals: memory states, environment variables, stack traces, and even sensitive