| Threat | Mitigation |
|---|---|
| Archive id used as path | Archive IDs are opaque uint32_t; never interpolated into paths without validation. |
| Input frame spoofing | Platform adapters are the only trusted frame source. |
| DrivingModeGate bypass | DrivingModeGate is stateless and re-evaluated every frame from the CAN bus. |
| Channel enum out-of-range | ChannelLabel() returns "??" for out-of-range values; parsers return nullopt. |
Bluetooth/WiFi channel interception and physical hardware tampering are addressed at the platform layer, not the gesture engine layer.