- Removed unnecessary fields from logs where applicable to reduce clutter and focus on essential information. - Ensured consistent logging practices to enhance security and prevent log injection vulnerabilities.
- Removed unnecessary fields from logs where applicable to reduce clutter and focus on essential information. - Ensured consistent logging practices to enhance security and prevent log injection vulnerabilities.