That's what's happening for me, yes, unless there is a variable I haven't accounted for, which is possible.
I don't
think a cloud file trigger is necessary to make it happen, but it occurs to me that I'm not 100% sure how recently I last tried to use a timed (about five times a day) check instead of the cloud file trigger, so I suppose I have not completely ruled out that rather than a token expiring, I'm hitting some kind of Dropbox rate limit based on a four-hour window; I will test that today.
That said, assuming the trigger polling interval works as expected, I seem to have had the same four-hour behavior with triggers polling only every ten minutes, and I'd be
somewhat surprised if that were triggering such a limit.
Also worth noting, although I'm nowhere near certain I've understood this part correctly: Going by the documentation at
https://dropbox.tech/dev...ssions-and-access-tokens , I
expected that if the Visualcron implementation used refresh tokens as prescribed, then when I tried to authenticate using my system browser rather than the internal one, the url it took me to would include "&token_access_type=offline", and it didn't. (In fact, I briefly had hopes that just adding that to the url and reloading the page before approving access would fix the problem, but alas, it did not - and shouldn't have, if that were actually part of the issue, since just because the response includes a refresh token wouldn't mean the access token was being handled any differently.) However, it's entirely possible I'm wrong about that being the point at which that parameter would be needed.
I wish I had paid closer attention to when I made which changes and to Dropbox's change announcements, because I don't
think the observed behavior fits with the originally announced timeline of their discontinuing long-lived access tokens and requiring the use of refresh tokens starting September 30...but then, I don't think anything else fits both the observed behavior and the timeline either unless they not only do have something that invalidates permissions or tokens based on a four-hour rate limit window, but reduced that limit on at least three separate occasions this year. However, that's all based on vague recollections rather than recorded observations.