I suppose to have to same level of security as for QEMU VMs, in which you also need to authenticate on the guest OS.
I can't follow this one, just to clarify:
1. If one sets up a CT, it is possible skip password entry completely, which is a secure way of doing things as well. It is possible to set SSH key, in which case the PVE GUI is completely useless to access the CT (unless one suggests to ssh through from the host's shell means via GUI).
2. The only (passwordless) way to enter a VM (without e.g. guest tools of sorts) is SSH, which is secure, but not as secure as no SSH at all. The benefit of a CT is that it is (potentially) MORE secure (no passwords, no SSH). The very fact I can access a VM's or CT's host, therefore also its volume, change
/etc/shadow
as I wish ... makes it not ANY MORE secure to ask for password, just inconvenient.
3. For a CT, one can spawn a process like a shell from the host, attaching to the CT's namespace without having to add anything into the CT itself. One can do this manually even, so not having it done by PVE instead of the pty approach is just increasing risk unnecessarily (by having to add SSH where it would not have been needed).
I suspect PVE just reused the same from the VM on the CTs, which forces one to have passwords set on container users OR ssh access, which is suboptimal.