Trigger a server error to see what sensitive information is leaked.
Stack traces often contain database passwords, internal IPs, and file paths.