rdns dev here
ryrona each over using IPC
Different things. IPC over Binder or other forms (like over Unix Domain Sockets, pipes, files etc) need protection too, but they are distinct from IPC (RPC) over "network" (sockets). And so, will need different kinds of implementation. For network specifically, what OP seems to be asking for is a "Windows Defender" like suite of tools, to be bundled in Graphene.
Layamir VPN profiles but it should be native, clean, and secure.
What is meant by "native" & "secure"? The current way to achieve network isolation (via "VPN profiles") is already native in the sense the routing tables are all setup so installed apps couldn't bypass the VPN ("Block connections without VPN" aka "VPN Lockdown" is enabled by default on Graphene) and if the installed app did bypass, the traffic would simply be blackholed by the OS natively.
Though, with eBPF and raw access to nftables, the OS developers can make any such such firewall more performant and potentially also prevent "privileged apps" (like System apps) from bypassing "Lockdown VPNs" (but they can also extend those protections to "VPN profiles").
That said, from what I can tell, AOSP (and Graphene?) want to move (confidential compute / data, especially) as much as they can outside the Linux Kernel (ex: pKVM, TEE, SE etc) and grant as little permission & privilege possible to admin services/apps (ex: Binderized HAL, strong compartmentalization of services started during init, rootless su, etc), as Linux's monolith structure has been a source of many a critical security issue for AOSP (the nicely sandboxed userspace is totally reliant on the security of the Kernel & its subsystems).