The same way they minimize the vulnerability when running on an exploited Windows machine?
Even if I log in, via a MITM attack, all they can do is read my account history.
Actually making changes requires further authorization. When I make a payment the screen asks me to confirm the amount I'm about to pay. The same applies to other security sensitive changes.
Still, you make a very valid point, and I thank you for pointing out the flaw in my understanding.
I still have a very deep distrust about centralizing identification, payment, and apps on a single device, and strongly dislike the inability to have physically very distinct trust levels.