The database stared back at us, rows of names, emails, and IDs glowing under the terminal’s cursor. One wrong move, and private data could spill into logs, test snapshots, or staging environments. We needed to prove, fast, that we could mask sensitive data without breaking functionality. That’s where