Figure-3-Hard-coded-credentials-on-the-wire