Recording calls is one of those things that being privileged allows.
It's a privileged permission and GrapheneOS enforces privileged permission whitelisting as required by the standard Android security model.
SMALL application. BCR is very small.
It's quite large in the sense we're talking about. Small is a few thousand lines of code like Auditor.
That's a major problem and a very poor position for you to try to support since it makes absolutely NO sense.
We've explained why that's the case. GPLv3 imposes additional restrictions which AOSP avoids including forbidding making devices with an immutable root of trust. This is a problem because we don't want to forbid making a device with GrapheneOS without support for unlocking. What if we want to sell a special variant of a GrapheneOS device without support for that to reduce attack surface, particularly since it's something many companies prefer? It's not anywhere close to the lowest hanging fruit for verified boot attack surface but it is attack surface.