iOS 13 is still in beta and therefore it is expected errors, but a newly discovered vulnerability in the operating system is especially worth noting. This iOS 13 error makes it easy for anyone to access the "Website and app password" data in Settings.
Sylvania HomeKit Light Strip
Most importantly, when running iOS 13 developer beta 3 or the second public beta of iOS 13, it is incredibly easy to bypass the face ID or touch identification prompt in Settings when trying to access the passwords your iCloud keychain. The problem was first listed on Reddit.
As described in iDeviceHelp on YouTube, you can access all of the stored user names and passwords in Settings by repeatedly pressing the "Site and app password" menu and avoiding the Face ID or Touch ID prompt. After several attempts, iOS 13 will show all your passwords and credentials, even if you are never approved with Face ID or Touch ID.
9to5Mac confirmed that this vulnerability is present in the latest iOS 13 developer beta. Apple has been informed of the issue through the Feedback app on iOS 13, but has not yet recognized it. The error is also present in the latest pastures of iPadOS 13.
Of course, to access the "Website and app password" menu, someone would also need to unlock your device initially, whether through Face ID , Touch ID or with your password.
By running an iOS beta, you accept a certain level of risk and this vulnerability is a good example of such a risk. Although it is noteworthy that such a large security hole is present in the public beta of iOS 13, which Apple released before the plan to users. Nevertheless, you should never expect an iOS beta to be completely safe and stable, especially just 6 weeks in the testing process.
Apple launched iOS 13 beta 3 to developers July 2. This means we are probably only a day or two away from the solution of iOS 13 beta 4. Ideally, iOS 13 beta 4 and iOS 13 public beta 3 will address this vulnerability, but there is no guarantee.
To see the error going on, see the video below.