Hello @Varshithvhegde, I was wondering if I could contribute some examples and use cases in the documentation. I'm happy to help. Let me know what you guys think.
I strongly recommend implementing a time limit to enhance the security. Without a time restriction, there may be a risk similar to what has been seen with Lightshot, where people could guess screenshot codes to access sensitive information. A 48-hour limit would be a good starting point, but the crucial issue to address is that, as it currently stands, anyone's files can be brute-forced in just a few minutes using a couple of proxies.