Let's talk about the capabilities of these tools on locked android and iOS devices.
I did some research and some informations may be not accurate but here are my conclusions :
AFU iOS : Access to any iPhones even if running latest iOS version
BFU iOS : can perform a brute-force only up to iPhone 11 series thanks to checkm8 exploit (don't know what hardware vulnerability they are exploiting in XR and 11 series)
Android AFU : Google Pixels running stock OS were vulnerable until march or april 2024 security patch update because of vulnerability in fastboot mode, magnet and msab were actively exploiting the vulnerability
Android BFU : starting pixels 6 series, no BF capabilities
Others Android distributions (Samsung, Oppo, Xiaomi ect) all vulnerable in AFU and BFU
GrapheneOS AFU : no known exploit since 2022 vendor security patch update . They can only perform an extraction if user provide the credentials or if device unlocked. However, DE storage space is still accessible without user credentials and can reveal to the examiner installed packages or user file sizes in profiles. It is not a vulnerability but just how AOSP is designed.