Many times, application logs the input data to ease the debug process. Now, if an application is logging sensitive information, then its data will be captured on device logs. An attacker can easily dump device logs and retrieve the user's sensitive information.
Let's follow the given steps to capture device logs that are leaking sensitive information:
This issue arises when the developers forget to remove logs during the release of the application. So, make sure that you have not enabled logs after debug mode.