I recently installed a custom rom (CrDroid) on my phone (Poco X3 NFC), and the maintainer of my rom includes a kernel with KernelSU preinstalled. The implementation is most likely this one: https://github.com/tiann/KernelSU . In the readme, it links to this site as inspiration for the project: https://git.zx2c4.com/kernel-assisted-superuser/about/ . Here, the person that originally came up with KernelSU explains that it is a horrible idea security wise. However, it seems that the new project behaves differently from the creator’s original implementation. Originally, KernelSU would make it so that anything that requested SU privileges would instantly gain them (I can immediately see the issue with this). However, in the newer implementation, KernelSU not only exists in kernelspace, but also includes a userspace companion app meant to manage SU privileges on an app-by-app basis. In addition, apps have to be manually granted SU privileges in this app to receive them (default is no SU privileges). Besides the odd zero-day exploit and user error like granting SU privileges to sketchy apps, are there any other security issues with using this software? How different is KernelSU security wise compared to different rooting solutions like magisk?