Back around October people became aware that GrapheneOS suffered from a really bad lockscreen bug that an attacker with physical access could quickly exploit.
That's not accurate. We discovered it in June. It was fixed for Android as a whole in the November security patches. It was a High, not Critical severity vulnerability due to not being remotely exploitable. It did not in any way bypass encryption or allow obtaining data from a device that's at rest. Any OS vulnerability able to be used to exploit the OS while logged in (not at rest) and locked can do the same thing as that lockscreen bypass bug. Remote code execution vulnerabilities are regularly patched, so one that requires physical access and achieves much less is lower severity. You're misinterpreting media coverage and exaggerations as reflecting the actual severity of an issue. This is not an area where Android is doing worse than iOS...
The really bad news is that some large undetermined number of non-GrapheneOS Android devices also had that bug, which was co-discovered by GrapheneOS and responsibly disclosed to Google. I suspect millions of people are still carrying unpatched phones.
It impacted every Android device not substantially changing the lockscreen code, which almost no one would be doing.
At present, security is genuinely hard. GrapheneOS is trying genuinely harder than other people. I'm not sure who can provide much more assurance. There are government "secure" phones, but honestly it's unclear how hard people try to break into them, and regardless you and I can't have them.
That bug was not relevant to a device that's at rest which is what the question was about. If the device is not at rest then any exploit giving control over the OS / application processor gives access to the data since it's not at rest and the OS can access it. It's not the topic.