Anon - 2019-05-22

I have a macOS security / inadvertent information disclosure question.
Scenario: I have an encrypted file container where I store documents
in several different formats, including Word, Pages, OpenDocument,
PDF, etc.
1) I mount an encrypted file container volume using a VeraCrypt
favorite.

2) I mangle files on that mounted volume, including both using apps
and the Terminal CLI.
3) I unmount the encrypted volume.

I know I have the following potential information disclosure risks on
macOS:
a) QuickLook (obvious)

b) VeraCrypt favorites (disclosure of existence of encrypted file
containers)
c) ~/.bash* (disclosure of filenames, etc. in encrypted file
containers)
Any suggestions on the best way to automatically mitigate those risks?
(I wish VeraCrypt would have an option to automatically run a script
before a dismount occurs!)

What other things should I be concerned about?
i) /tmp (Can I wipe it clean while still logged in and running other
apps that use data outside of the VeraCrypt volume? Will logging out
of the user actually COMPLETELY wipe /tmp?)
ii) ~/Library/Cache/* (How can I identify associated risks?)
iii) /Library/Cache (Anything here?)
iv) Others? /Library/Application Support, ~/Library/Application
Support -- what else?

Bottom line: How do I wipe EVERYTHING associated with using an
encrypted file container on macOS, such that NO information regarding
the container's existence and/or its contents can be forensically
discovered?

THANKS!