mmobder It's about whenever:
- it's possible to claim that GOS is built in a way that enabling SCSI module/infra (if it's robust by itself) shouldn't pose significant risks
- enabling scsi module/drivers in general are not that different from enabling USB
I don't think it's possible for people here to issue assurances along those lines. Adding device drivers that run on top of USB is definitely different from merely enabling USB transport, because there's a lot more code. Adding device drivers of any kind to the GrapheneOS kernel poses risks if those device drivers are risky.
GrapheneOS does do some kernel hardening, but it balances safety and performance, and I don't think there's anything structural related to device drivers such as running each one in a VM. So I suspect that if you received an answer from a GrapheneOS developer it wouldn't be, on the one hand, that there is a known specific risk to including SCSI CD-ROM drivers in GrapheneOS or, on the other hand, that it would probably be fine to do that without auditing the large body of code. I suspect it would take a lot of effort for somebody to estimate the risk, and I suspect nobody has done that work.
If vulnerabilities are found in the Linux floppy disc driver in 2018 (CVE-2018-7755), 2019 (CVE-2019-14283), 2021 (CVE-2021-20261), and 2022 (CVE-2022-1652), it seems plausible that the sr/sg drivers might contain vulnerabilities too.