A large trove of sensitive credentials, authentication keys, configuration data, tokens, and API keys has been potentially ...