> How likely is it for an attacker to get access to the user's cookie jar at a single instant in time only?
Depends on the dwell time the attacker has until detection and eviction, but generally speaking, in the scenario where session tokens are being harvested from a user’s workstation or something like a jump server, the attacker is going to be able to access stored session tokens from the most recent login prior to their gaining access and any that occur during access. In any case, shorter session tokens are going to result in less access for the attacker. There isn’t a scenario that results in more access, and only absurdly contrived scenarios that result in the same access.
> If the token isn't refreshable without a "real token" the "real token" will probably need to be somewhere the attacker can get it anyway.
That may be true of ticket-granting-ticket schemes, but not for single/multifactor authentication for ticket schemes. Both scenarios exist and need to be accounted for appropriately.
> There are instances where session timeouts/forced reauth are useful and where an attacker could not endlessly refresh the token.
If the token isn't refreshable without a "real token" the "real token" will probably need to be somewhere the attacker can get it anyway.