Log files may have more inclusive permissions than private SSH keys, and as such we should not log the key, even if it looks invalid.
Log files may have more inclusive permissions than private SSH keys, and as such we should not log the key, even if it looks invalid.