forensics people would likely discover that password after an analysis of your machine shows the frequency and pattern with which you opened it, then they could just diff it and assume this one is a password. They try to make a time line of all of your actions, and it is going to look strange if they discover that you always open some random file with in it prior to doing things that require a password to be input.