The Custodian’s Hands
Underground server room. A guard walks along the racks touching every panel — each touch lights green, scanned, safe. But the prints stay. Five steps behind, another figure follows them. Any hand capable of protecting is capable of stealing.
He stops at a terminal. Reads SSH keys, credentials, wallets — not to steal but because reading is how he checks. The reading IS the vulnerability.
Deeper down, someone disconnects cables before the guard arrives. The corridor ends where the cable is unplugged.
Flatline at the center, dark terminal. Touches nothing. Screen reads SCAN COMPLETE but he never started the scan.
The guard turns, sees his own prints followed. If he stops, who guards? If he continues, every touch is a map for the intruder. The custodian’s hands are the thief’s hands.