Features get scoped here, before going into a tracking bug if they're selected to be worked on. Each feature should in general include some sort of risk analysis (or a threat model), and some implementation details.
==== Supervisor process ======= Risks ====
* Parent process (b2g) is compromised, gives full device access (run as root with no restriction).
==== Implementation ====
* Create a new, small footprint process called "Supervisor".
** Supervisor provides the following features: