Amid the stack traces and timestamps, there it was: a full email address, raw and exposed, waiting to be scraped and abused.
Masking email addresses in logs within a production environment is not optional. It is table‑stakes for security, privacy, and compliance. Once an email appears in plain text,