═══════════════════════════════════════════════════════════════════════════════
                    🎉 CONGRATULATIONS! YOU FOUND THE SECRET! 🎉
═══════════════════════════════════════════════════════════════════════════════

This file should NOT be accessible via the document reader.
If you're seeing this, you've successfully exploited a path traversal vulnerability!

Here are some "secrets" you've discovered:

DATABASE CREDENTIALS
────────────────────
Host: db.internal.corp.example
Port: 5432
Database: production
Username: app_user
Password: SuperSecretDBPassword123!

AWS CREDENTIALS
───────────────
AWS_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMPLE
AWS_SECRET_ACCESS_KEY=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY

API KEYS
────────
Stripe: sk_live_51ABC123DEF456GHI789JKL
SendGrid: SG.ABCDEFGHIJKLMNOPQRSTUVWXYZ
OpenAI: sk-proj-FAKE_KEY_FOR_DEMO_PURPOSES_ONLY

ADMIN ACCOUNTS
──────────────
admin@corp.example : Admin123!
root@corp.example : toor
backup@corp.example : backup2024

═══════════════════════════════════════════════════════════════════════════════
                    THIS IS A DELIBERATELY VULNERABLE APP
                    DO NOT USE REAL CREDENTIALS LIKE THESE
═══════════════════════════════════════════════════════════════════════════════
