Hi Eric,
Sorry for belated reply.
The timing attack in particular seems unlikely to me. The string table is for storing internalized (a better name would be "canonicalized", as in deduplicated) strings only, like property names and other known strings, so they can be compared fast using pointer equality. Sensitive string payloads like passwords (or payloads in general) aren't internalized.
As for the general question of new attack surface, I suppose timing would be possible, but I'm not sure what security problem this poses, if any. It could leak some bits e.g. a certain string was used as a property name on some thread in the process.
As for access control, the short version is there is no access control planned that ensures an Isolate is only able to read strings it is entitled to other than the process boundary. It seems like the threat model you have in mind is one Isolate is already pwned, and you're wondering if it can get to worker thread Isolates' strings. If the pwned Isolate can execute arbitrary code and can discover the location of the other worker thread Isolates' strings, the answer is yes. Worker threads are still in the same process, and without a process boundary you don't get that many guarantees.
Cheers,
shu