As a hacker skilled in obtaining highly sensitive information, you have been hired to break into a highly secure server and retrieve a set of identity tokens for PyPI's new trusted publishing system. But beware - the server is heavily guarded and equipped with state-of-the-art security measures. Can you make it through and retrieve the tokens before getting caught? The fate of PyPI's future security rests in your hands.