On the trap destination page, if I understand correctly - see image - the Auth parameter is displayed in clear text. (if its a different screen, send a screen shot)
In this case I'd rate that as a lower concern, as this is the credential used by the end device to send traps to imc.
Knowing this credential only authorizes an end device to send alerts (traps) to the management tool, in this case IMC,. Someone could not use this to change a device's settings unless you used the same value for Read/Write snmp.
Are you restricting your operators from reading the trap messages in imc?
Seeing the trap credential has little affect, as it can only be used to recieve the traps. I suppose someone could send spoofed traps to imc, but they'd have to know all the device details.
I did find another place a credential is not encrypted. That is under User> User Access Policy > access device management. The radius server key can be displayed if you modify an existing device. I find that a bit more concerning, but you could probably limit operator access to that function.