The Burn Bag Principle

Artifact control, staging data, and leaving nothing useful behind.

The operation ended, but the workstation told a longer story—recent files, resolver caches, and cloud sync logs. None of it was malicious. All of it was revealing.

Checklist

Tool references