> i'd like examples of what those are, for this specific usecase, because all setup happens before the target untrusted application is even started
I don't know a concrete example, it's just a guess. One might need to open fds to pass around data. In POSIX shell that typically requires fixed fd numbers. If there is C code which wants to pass a fd into the sandbox it might happens to be the same as the one used in the shell code and some data ends up in places it wasn't supposed to.
As far as I can tell you are also assuming a shell to be available in the new user namespace. I have used bwrap in ways where this was not the case.