Thanks for your reaction.
If I'm not mistaken, it's not "full access" that is required though (i.e., no root password is necessary to access the sqlite database and the password).
Leaving such a sensitive information accessible to *any* process is sloppy.
@lienrag @Mer__edith if a machine is compromised, all you need to do is screen captures at short intervals to get a lot of useful information. Not passwords required.