The corresponding checks have been developed.
# Please don't cry if my Python code looks like C.
#
#
-# N.B Hardening command line parameters:
+# N.B Missing hardening command line parameters:
# iommu=force (does it help against DMA attacks?)
#
-# The list of disabled mitigations of CPU vulnerabilities:
-# mitigations=off
-# pti=off
-# spectre_v2=off
-# spectre_v2_user=off
-# spec_store_bypass_disable=off
-# l1tf=off
-# mds=off
-# tsx_async_abort=off
-# srbds=off
-# mmio_stale_data=off
-# retbleed=off
-# nopti
-# nokaslr
-# nospectre_v1
-# nospectre_v2
-# nospectre_bhb
-# nospec_store_bypass_disable
-# kpti=0
-# ssbd=force-off
-# nosmt (enabled)
-#
# Hardware tag-based KASAN with arm64 Memory Tagging Extension (MTE):
# kasan=on
# kasan.stacktrace=off