Bypass password protection and delete application authorization.
-
<p><strong>Reproduction steps:</strong></p>
<p><span>The specific reproduction video and trace are placed in the network disk.</span></p>
<p><strong>Actual result:</strong></p>
<p><span>The authorization file was successfully deleted.</span></p>
<p><strong>Expected Result:</strong></p>
<p>Unable to delete authorization file.</p>