You might be describing the known words libraries that form part of seed phrase systems and exist all over the place. Nothing proprietary there. It's a list standard.
Beyond that, to run through the combinations would take longer than the heat death of the universe.
Every single wallet that was created with your app is left vulnerable to a dictionary attack which can be performed by anybody that half assed knows how to run hashcat.
You can't target specific wallets but you can run an android VM instance and run a brute force in to wallet recovery gaining access to random wallets which can be done in minutes