Logging is a vital part of a development lifecycle to help identify runtime behavior and events. Unfortunately it is easy to provide insufficient or dangerous logs that an attacker could manipulate or expose sensitive information.
I propose writing a case study delving into the various security vulnerabilities involved with logging. These include improper output validation, insufficient logging, exposing secrets, and log injection.
References: