Currently, when configuring post-login commands in session properties under Authentication (e.g., sending enable\npassword to enter privileged mode after SSH login), the password is stored in plain text in the session configuration.
This poses a security risk, especially when session profiles are shared or stored in version control.
Similar functionality exists in SecureCRT's "Logon Actions", but it also stores credentials in plain text. It would be great if WindTerm could improve this by allowing the password (or the entire post-login command sequence) to be stored in an encrypted format, possibly using the same master password mechanism that WindTerm already uses to protect saved session passwords.
Suggestion:
Allow post-login commands to reference the session's saved (encrypted) password, so users can simply use something like enable\n$(PASSWORD) without re-entering it in plain text.
Or provide an option to encrypt the entire "execute after authentication" script.
This would enhance security while maintaining convenience for users who need to automate privilege escalation after login.