Same token pattern reused across staging and production
Bad input: Environment prefix predictable and entropy too low.
Failure: Attackers can enumerate token shape and increase hit probability.
Fix: Use high-entropy generation and isolate secrets per environment.