It would take the perfect storm of captured screenshots and already compromised login info related to those captured screenshots for anyone to take advantage of this security flaw. You’d also have to be the kind of person who installs shady apps on their phone in the first place and I doubt there is much overlap…