Debug logs are generally designed to be used to detect and correct flaws in an application.
These logs can leak sensitive information that may help an attacker create a more powerful attack.
The evidence table shows any OSLog messages detected while performing dynamic analysis.
This unified logging system stores messages in memory and in a data store, rather than writing to text-based log files.
Steps to Reproduce
Debug logs are generally designed to be used to detect and correct flaws in an application. These logs can leak sensitive information that may help an attacker create a more powerful attack. The evidence table shows any OSLog messages detected while performing dynamic analysis. This unified logging system stores messages in memory and in a data store, rather than writing to text-based log files.
Application
See more detail in the NowSecure Report