Token from memory theft
Stealing session tokens out of memory seems like a neat (new? new-old?) trick, the kind of thing CPU side-channel attacks wish they could do in the real world.
I wonder how many other vulnerabilities on the outset look like simple memory reads that don't turn up anything useful, only for someone to use them to scan RAM for login tokens. Like Windows hash theft but... easier.