Also consider someone could fork those implementation to add log feature or perform log on different level (e.g. on networking level)
So, even if you know electrumx (or electrs, or....) and you have actually read the complete sourcecode and you're satisfied a default "electrumx" node cannot log anything you don't accept, you should still realise somebody could run a modified version of "electrumx".
On top of this, electrs needs a reverse proxy if you want to add tls, this is one more level where log files can be created.
Now, the fact does remain that private key(s) or seeds are not sent to the electrum node, so a node operator can harm your privacy, but he cannot steal your actual funds (unless there's an undiscovered bug).