Hey there @Niklas974, welcome to the community! I agree, there are certainly improvements to be made, and I think I can speak for the entire security WG when I say that we’d love the help.

You mention that you have a background in security, but it’s unclear how familiar you are with ROS 2 in general so I’ll try not to make any assumptions. Are you already familiar with DDS-Security? If not, this design doc will probably be a helpful place to start, followed by the spec. You’ll note that we’re a little limited by the union of “things allowed under the spec” and “things supported by each tier 1 vendor”. For example, I’m not sure that all vendors check a CRL, so revocation could be a bit of an issue. Consider that not all robots are online, as well, so what happens if you can’t reach the CRL? Additionally, I’m not sure how deep you can chain (consider parameter size limits). Some examples of the challenges (and experiments needing to happen), here.

Perhaps a design doc of what you envision (or a proposed modification of the above linked design doc) is the best place to start? We can get you on the agenda for the next security WG meeting as well if you like (happening on the 8th, see the security WG community page for details on how to get the calendar events as well as a link to our Matrix room).