If I understood AppCheck's workflow correctly, it essentially creates a jwt token with certain expiry based on successful attestation mechanism. Afterwards, all requests containing this jwt are treated as valid and coming from allowed app.
But say someone was to download a legitimate app and inspect their networking to view and copy such jwt token (say in the same way as inspecting network in dev tools in browsers).
This jwt token can then be plugged in to any other app i.e a localhost server and combined with projectid etc... to perform requests that look legitimate, but are now coming from un-authenticated app?