phones that have been rebooted but not unlocked are still fully encrypted and cannot be accessed without the password, compared to an afu state where the key is already loaded into memory, so it can be accessed by an exploit if law enforcement were to obtain it while it was in an AFU state, so make sure to reboot your phone if you ever hand it over.
It all comes down to your passwords. There are no known vulnerabilities or weaknesses as of now.
Use a strong passphrase for your LUKS (6/7 words), disable fingerprint unlock on your pixel and use a strong pin/password.
That's all you can do.
The encryption is still not cracked. The weak point is still the user, password strength, fingerprint unlock, pick you favorite.
Also note that a smart phone is packed with tons of sensors spying on you 24/7. You should never carry with you any sensors powered ON during your sensitive operation. You cannot know what it leaks and how your the usage of the device already provided an intelligence against you.
If you cannot rice the device heavily SW & HW, if you were not trained in proper security procedures and routines, don't use it. It is a serious OpSec failure that should be avoided.
phones that have been rebooted but not unlocked are still fully encrypted and cannot be accessed without the password, compared to an afu state where the key is already loaded into memory, so it can be accessed by an exploit if law enforcement were to obtain it while it was in an AFU state, so make sure to reboot your phone if you ever hand it over.