This uses the file system API, which users can use to grant read and write access to entire folders.
Malicious apps will never trick users into granting access to folders they shouldn’t, whereupon they won’t have their files exfiltrated, encrypted, and held to ransom.