could you expand more on this and be more specific about your concerns: "I did notice that code design and proposals were abnormally vulnerable to some class of attacks to target Bitcoin use-cases"
All transaction-relay jamming attacks against Lightning nodes. Google things like pinning and replacement cycling. While experts have divergent opinions on severity and exploitability, none to the best of my knowledge have demonstrated their implausibility.
reply