It is not a DKIM bug. DKIM PASS says that the message was handled by domain X and it has not been altered since the signature was applied. Reply attacks work because neither of those rules are broken during the forward.
DKIM Replay allows a sender to shift his dirty work from the initiating Gmail or Outlook account, where he will likely be throttled, to a server under his control, where he will not be throttled. So if you have existing negative reputation about the replay server identity, you will still block the message. If not, you will have to depend on content filtering.
All forms of forwarding are a problem, because the forwarding service hides some or all of the originator's identity. If the forwarder allows unwanted messages through his service, you are poorly positioned to filter based on originator identity;
Sender verification (SPF/DKIM/DMARC) can only ensure that the sender identities are true, so that reputations can be applied based on those identities. If you have no sender reputation information, then you have to depend on content filtering. For example, we regularly receive and block malicious message from from properly-identified Gmail accounts.
Sometimes you need to exempt a trusted sender from some or all spam checks (a.k.a. whitlelisting). The worst possible scenario is to allow whitelisting of a spoofed identifier: A successful spoof switches the message from untrusted to trusted, and the trusted status exempts the message from spam checks. Therefore, whitelisting should be used with caution (because whitelisted sources can get compromised) and should require some form of sender verification, so that spoofing risk can be ruled out.
This means that whitelisting requires multi-part allow rules:
1) If identifier = <trusted sender ID> and
2) That sender is verified using <authentication technique>
Often we need proxy verification that cannot be provided by SPF and DMARC. For example, you may get a password reset message from your favorite website. The message is sent through Sendgrid and the message does not have a DKIM signature for the website domain. To provide whitelisting for this situation:
2) Mail From domain is verified by SPF
3) From domain is <trusted vendor name>