
- Key Takeaways
- A ban sounds clean. Space supply chains are not.
- The phrase foreign component hides three separate problems
- The lesson from the RD-180 was not "ban everything"
- Governments already avoid all-or-nothing logic
- Certification is a trust regime, not a slogan
- Foreign ownership is not ignored now, and it should not be
- Space Force is signaling something industry should hear clearly
- Europe is reaching the same answer with different vocabulary
- This is where blocking is justified
- Propulsion deserves its own rulebook
- The danger zone is broader than hardware
- Counterfeit and gray-market parts expose the weakness of nationality screens
- Materials, power systems, and sensors need a different threshold
- Domestic content percentages misread the real risk
- Prime contractors should carry the burden of proof
- Where blocking backfires
- Allied supply is not the same thing as open supply
- Civil, commercial, and military systems should not share the same threshold
- If governments want security, they need speed as well as restriction
- A tougher standard for software and digital support
- What a smarter procurement rule would look like
- The political temptation is easy to understand
- Governments need a living control list, not a frozen rulebook
- Summary
- Appendix: Top 10 Questions Answered in This Article
Key Takeaways
- Blanket bans sound tough, but targeted controls fit space hardware reality far better.
- Space security risk sits in trusted chokepoints, not in every imported bolt or board.
- The safest policy mixes selective blocking, allied sourcing, and faster domestic qualification.
A ban sounds clean. Space supply chains are not.
A blanket ban on foreign components in space systems would feel decisive and fail in practice. It would raise costs, lengthen schedules, shrink supplier choice, and still leave governments exposed to the very dependencies that matter most, because the hardest vulnerabilities in space hardware rarely sit in the obvious places. They sit in propulsion, flight computers, radiation-hardened semiconductors, secure communications modules, crypto, power electronics, star trackers, satellite software toolchains, and a short list of specialty materials and processes that can’t be swapped out on short notice.
That is why the better answer is narrower and harsher at the same time. Governments should block foreign components in a defined set of mission-defining categories when the supplier is tied to an adversarial state, when the part creates a trusted-function dependency, when remote access or update control could be abused, or when the supply path is so concentrated that a political shock can ground a launch program or stall a satellite line. Outside those categories, blanket exclusion is bad policy. It treats Japan, France, Canada, and the People’s Republic of China as if they create the same risk. They do not.
The phrase foreign component hides three separate problems
Policy debates often mash together three issues that need to be kept separate. The first is adversarial dependence. A rocket engine sourced from Russia or a sensitive electronics chain tied to entities under heavy United States controls raises one kind of problem, because a government confrontation can cut access overnight. The second is trusted-function exposure. A part that handles command, encryption, timing, sensor fusion, or autonomous decision support is not just another input. It sits inside the logic of the mission. The third is industrial concentration. A component can be made in a friendly country and still be a poor policy choice if only one qualified supplier exists and requalification takes years.
Once those categories are separated, the slogan starts to fall apart. A foreign fastener, foreign aluminum billet, or foreign solar blanket substrate is not automatically a national security threat. A foreign flight computer, a foreign secure satellite communications module, or a foreign propulsion dependency can be. Even then, nationality by itself is not a strong enough test. Ownership structure, software access, update authority, export control status, production location, tooling control, and the ability to inspect or reproduce the manufacturing process matter at least as much as the flag next to the supplier name.
The lesson from the RD-180 was not “ban everything”
The best known American case is the RD-180. For years, United Launch Alliance used the Russian-built engine on the Atlas V for highly sensitive national security launches. That arrangement looked acceptable while the political environment was stable and the launch record stayed strong. After Russia’s 2014 seizure of Crimea, it stopped looking prudent. A 2025 Government Accountability Office review of national security space launch explained that those events led to concerns over that dependence and noted that Congress moved to prohibit the use of Russian-designed or Russian-manufactured engines for those launch procurements after a limited transition period. The dependence was real, visible, and no longer tolerable.
That example does not support a universal rule against all foreign content. It supports a focused rule against foreign control of single-point mission dependencies. The problem was not that the engine was imported in the abstract. The problem was that a key propulsion node for sensitive launches depended on a geopolitical rival, with very little room for substitution and very high switching costs. That is a much tighter proposition, and a much more useful one for present policy.
Governments already avoid all-or-nothing logic
The architecture of existing policy already shows that governments know blanket bans are too coarse. International Traffic in Arms Regulations and the Export Administration Regulations do not treat all hardware the same way. They sort technologies by sensitivity, destination, end use, and end user. Some transfers are licensed, some are heavily restricted, and some are blocked. That system is often slow and frustrating for industry, but its basic logic is sound. States already know that a star tracker, radiation-tolerant field-programmable gate array, or secure command link deserves a different rule than a commodity support item.
The same pattern shows up in launch oversight. The Federal Aviation Administration states that it protects not only public safety but also the national security and foreign policy interests of the United States during commercial launch and reentry activity. That is not a trivial detail. It means a launch is not reviewed only as a safety event. It is also reviewed as a policy event. Payload review, operator licensing, and interagency consultation all create a channel for the government to look at the mission stack as a whole rather than pretending that a hardware supply decision sits outside state responsibility.
Certification is a trust regime, not a slogan
Launch certification makes the point even more clearly. Space Systems Command explained in late 2025 that commercial launch partners such as Blue Origin must be certified before they can carry national security payloads, and that the number of flights a new entrant has completed changes how much government insight into design and qualification testing will be required. That is the right instinct. Trust is built through evidence, testing, process visibility, and performance history. It is not built through patriotic branding.
That logic should extend below the launcher and into the spacecraft bill of materials. A government that demands deep insight into a launch vehicle before assigning a national security payload should not accept blind dependence on obscure black-box components further down the stack. The issue is not whether a minister or senator can say the word domestic in a hearing. The issue is whether the buying authority can see enough of the supply chain to know where remote access sits, who owns the masks and process recipes, where firmware signing authority lives, and how long replacement would take if a supplier were sanctioned, compromised, or simply overwhelmed.
Foreign ownership is not ignored now, and it should not be
American industrial security rules already separate foreign participation from foreign control. The Defense Counterintelligence and Security Agency says a U.S. company is considered under foreign ownership, control, or influence when a foreign interest has the power, direct or indirect, to direct or decide matters affecting management or operations in a way that could lead to unauthorized access to classified information or harm performance on classified contracts. DCSA also makes clear that such cases can be addressed through mitigation instruments such as Special Security Agreements and proxy arrangements rather than through automatic exclusion in every case.
That is a better model than a flat ban. It recognizes that capital, talent, and industrial cooperation often cross borders, while sensitive government work still needs boundaries, reporting, and enforceable control plans. A European-owned aerospace firm operating under a mitigation regime is not the same policy problem as a hidden dependency on an adversarial supplier that controls firmware updates on a secure communications payload. Governments should preserve that distinction. If they erase it, they do not become safer. They become less precise.
Space Force is signaling something industry should hear clearly
The 2024 U.S. Space Force commercial space strategy does not read like a manifesto for autarky. It says the service will be more resilient and capable if it combines organic capabilities with allied and commercial space solutions into hybrid architectures. It also says the service should avoid overreliance on any single provider or solution and should diversify supply chains. That is not the language of total exclusion. It is the language of managed dependence and structural redundancy.
This matters because some industrial lobbying now tries to turn every supply-chain concern into an argument for broad domestic-only rules. The evidence does not support that jump. Even in the national security segment, the government’s own posture is more selective. It wants resilience, trusted integration, multiple providers, and strong insight. It does not actually want to own and build every subassembly itself, nor does it appear ready to treat allied participation as a weakness. That is wise. A state that confuses alliance with exposure will pay more for less flexibility.
Europe is reaching the same answer with different vocabulary
European institutions are speaking in a different register but arriving at a similar conclusion. The European Space Agency says priority should be given to actions that address vulnerabilities in European supply chains by supporting development of strategic space components, systems, and technologies linked to technological non-dependence. ESA also warns that reliance on restricted sources outside Europe can lead to longer lead times, higher costs, and non-availability for satellite manufacturers. That is not a case for sealing Europe off from the world. It is a case for identifying which dependencies have become intolerable.
The European Commission has framed IRIS2 in the language of sovereignty and secure connectivity, and in December 2024 it signed the concession contract for a 290-satellite system as a step toward European sovereignty and secure connectivity. In March 2025, ESA also backed a new effort with Frontgrade Gaisler to push European space microprocessors toward deeper semiconductor autonomy. Those moves do not prove that Europe wants a blanket foreign-component ban. They prove something narrower and more serious: governments across the Atlantic have started to rank components by strategic consequence, and semiconductors are moving to the top of that list.
This is where blocking is justified
A selective blocking regime should start with trusted compute. Radiation-hardened and radiation-tolerant processors, field-programmable gate arrays, secure enclaves, timing devices, crypto modules, and command-and-data-handling boards should not be procured from suppliers tied to adversarial states for government missions or for commercial systems that support military, intelligence, or emergency communications functions. These parts are not passive. They shape spacecraft behavior and can become durable security liabilities if design authority, firmware control, or production visibility sits outside trusted channels.
The same is true of secure communications payload elements and the software that manages them. Satellites are no longer static boxes launched and then forgotten. They are updated, reconfigured, patched, and task-loaded across years of operation. That makes software provenance and remote administration rights as sensitive as the hardware itself. One unresolved question hangs over this category, and the answer is not fully settled yet. A software-defined bus can be audited, segmented, and tested, but the evidence is still thin on how much enduring trust a government can place in remote-update ecosystems when build environments, support teams, or signing chains are anchored abroad. That uncertainty should push policy toward stricter controls for mission software than many commercial buyers currently accept.
Propulsion deserves its own rulebook
Space policy often treats propulsion as if it were just another line item in a satellite or launcher budget. It is not. Engines, thrusters, valves, turbo machinery, ignition systems, and propulsion-grade materials are among the least substitutable elements in the stack. Qualification cycles are long. Failure modes are unforgiving. Interface changes propagate through the rest of the design. The RD-180 episode showed what happens when a politically exposed propulsion dependency is allowed to sit at the center of a national security launch architecture for too long.
The same logic applies to spacecraft propulsion, though with a different shape. An electric thruster or green monopropellant system from a friendly foreign supplier might be acceptable for many civil or commercial uses, especially where contracts guarantee data rights, inspection access, and second-source options. It should be unacceptable when the mission handles national command authority, missile warning support functions, protected communications, or strategic intelligence collection and the buying state cannot reproduce, inspect, or replace the propulsion chain in a crisis. Governments do not need a universal ban here. They need a red line around propulsion systems that can strand a program if a single outside supplier fails or is cut off.
The danger zone is broader than hardware
Hardware receives the political attention because it photographs well in hearings. The quieter weakness is buried in tools, test equipment, firmware, and cloud-linked support services. A space system can look domestically assembled and still depend on foreign-origin design software, special test fixtures, calibration gear, cybersecurity services, or firmware support paths that no one inside the procurement chain has mapped properly. The 2025 Defense Business Board work on supply chain illumination put geographic dependencies, foreign ownership concerns, and single-source reliance in the same problem frame for a reason. The department’s issue is not only where a part was made. It is also whether the government can see the full dependency chain behind that part.
This is where broad “buy national” slogans often become theater. They target the visible box and miss the hidden services that keep the box alive. Governments that want real control should require software bills of materials, firmware signing transparency, configuration-control disclosures, ownership reporting for enabling tools, and contract rights that survive supplier distress. Those measures sound less dramatic than a ban. They would do far more to reduce exposure.
Counterfeit and gray-market parts expose the weakness of nationality screens
Country-of-origin rules are also weaker than they look because counterfeit and gray-market parts can move through long reseller chains with misleading documentation. GAO reported in 2012 that investigators created a fictitious company, joined Internet platforms used by vendors of military-grade electronics, and obtained quotes for suspect parts through those channels. In a 2016 follow-up, GAO said the Department of Defense managed more than 4.7 million parts in fiscal year 2014 at a cost above 96 billion dollars and warned that counterfeit parts could delay missions and harm system integrity. That is a reminder that the threat is not only foreign government leverage. It is also poor traceability.
This matters for space because primes and subsystem suppliers sometimes face schedule pressure that pushes them toward broker markets when authorized channels tighten. A domestic-only slogan does nothing for that failure mode if the paperwork is weak and the trace path breaks below the original component manufacturer. A government serious about trusted space systems should care less about patriotic labeling on the shipping carton and more about verified chain of custody, authorized distribution, destructive and non-destructive test results, and the ability to trace a microcircuit back to the original fabrication and packaging flow. Nationality matters. Traceability can matter even more.
Materials, power systems, and sensors need a different threshold
Not every category needs the same degree of exclusion. Materials and passive components usually create a supply assurance problem before they create a compromise problem. Titanium, specialty alloys, composite feedstock, solar cell inputs, battery materials, and radiation-shielding products can be painful bottlenecks, but they do not all belong on the same control tier as a secure processor or crypto unit. Governments should reserve the strictest bans for functions that can alter behavior, expose protected data, or disable the mission through hidden control. For many materials, the better answer is diversification, stockpiling for defined needs, and prequalified second sources across domestic and allied industry.
Sensors and power systems sit in the middle. A star tracker, inertial unit, power-control board, or deployment controller may not look as politically charged as a launcher engine, yet they can become single points of mission failure. The buying state should classify those subsystems by consequence. If a sensor or power assembly can defeat mission assurance by hidden degradation, spoofing, malicious update behavior, or uninspectable firmware, it belongs closer to the trusted-function list. If it is easier to validate, easier to replace, and less exposed to remote control, a disclosure-and-audit rule can be enough.
Domestic content percentages misread the real risk
Many procurement systems still reach for local-content thresholds because percentages are easy to count. They are also easy to game. A spacecraft can be assembled in one country, integrated by a prime with a national flag, and still depend on foreign-origin semiconductors, software libraries, packaging services, calibration gear, and design tools that no percentage rule captures properly. Counting value added is useful for economic policy. It is a poor substitute for security analysis.
A better metric would track trusted-function exposure. Governments should ask how much of the spacecraft’s command authority, secure communications path, timing integrity, and mission autonomy depends on suppliers outside trusted control. They should also ask where recovery rights sit if the supplier fails, is sanctioned, or exits the market. A state that receives design files, manufacturing data, source code escrow, test rights, and a funded second-source path may be safer with a foreign-origin component from a trusted ally than with a nominally domestic component whose real design authority sits elsewhere. That is not a comfortable conclusion for politicians. It is still the right one.
Prime contractors should carry the burden of proof
Governments should stop letting trust questions drift down the chain until they become an emergency at payload integration. The burden should rest with the prime contractor from the start. If a launcher, satellite bus, payload prime, or ground-system integrator proposes a foreign component in a trusted-function category, the contractor should have to prove why the part is acceptable, what inspection rights exist, who controls updates, how a disruption would be managed, and what replacement path is available. No agency should have to discover a dangerous dependency by accident during a late review or after a sanction hits.
That proof requirement would change contractor behavior quickly. It would reward firms that map their lower-tier suppliers, negotiate stronger data rights, and think about replaceability before a design freezes. It would also expose an awkward truth inside much of the commercial space sector. A lot of companies say they know their supply chains. Far fewer can document control down to firmware authority, production tooling, and lower-tier packaging or test dependencies. Governments should not accept comforting diagrams where auditable evidence is required.
Where blocking backfires
The costs of overblocking are not theoretical. The Aerospace Industries Association and PwC warned in March 2026 that demand growth across the U.S. space sector is outpacing supplier capacity, that shortages in key components are delaying programs, and that legacy qualification requirements and limited access to certified testing facilities are raising costs and slowing innovation. A government that responds to those conditions by banning wide swaths of foreign content without first expanding domestic capacity and qualification infrastructure is writing delay straight into its own programs.
That effect lands hardest on smaller firms. Large primes such as Lockheed Martin, Northrop Grumman, Boeing, and Airbus Defence and Space can sometimes finance redesigns, stockpile long-lead items, or support a domestic requalification campaign. Startups and mid-tier suppliers usually cannot. The result is a policy that claims to strengthen the industrial base while quietly consolidating it around the few firms rich enough to absorb the transition. That is one reason blanket bans appeal politically and disappoint industrially. They punish the newest entrants first.
Allied supply is not the same thing as open supply
There is a difference between allied sourcing and open global sourcing, and governments should stop pretending otherwise. An ally with deep defense ties, export-control cooperation, secure handling rules, and a long record of industrial exchange does not pose the same problem as an opaque supplier under the shadow of state direction. That distinction already runs through defense trade practice, technology release decisions, intelligence sharing arrangements, and launch cooperation. It should be stated openly in space procurement policy rather than buried inside exemptions.
This point matters even more as space becomes a coalition enterprise. The International Space Station has long been a distributed industrial and operational system. Artemis hardware, lunar communications, and future cislunar logistics are also likely to be built through overlapping national and commercial partnerships. A blanket foreign-component doctrine would collide with the actual structure of those programs. Selective control can be made compatible with alliance. Blanket exclusion cannot, unless governments are prepared to sacrifice speed, cost, and diplomatic leverage all at once.
Civil, commercial, and military systems should not share the same threshold
A weather satellite, a commercial Earth observation constellation, a science probe, and a protected military communications spacecraft do not deserve identical sourcing rules. Governments already know this, even when public rhetoric suggests otherwise. The smarter move is to write separate sourcing thresholds tied to mission class, threat exposure, and consequence of compromise. High-consequence defense and intelligence systems should carry the strictest domestic or trusted-allied content rules for compute, communications, timing, propulsion, and cybersecurity-relevant software. Civil systems should carry strong disclosure and audit rules, plus targeted restrictions where a component touches sensitive government functions. Purely commercial systems should face the lightest hand unless they seek government anchor contracts in protected mission areas.
That tiered approach is not softer than a ban. In some categories it is harsher, because it refuses lazy substitution. It tells a contractor exactly which functions must be trusted, exactly which ownership and update pathways are unacceptable, and exactly which categories demand second-source planning. The enforcement question also becomes clearer. A procurement office can inspect compliance with a narrow and concrete rule set. It will struggle to apply a sweeping nationalist formula across globally entangled electronics, software, and materials flows.
If governments want security, they need speed as well as restriction
Security policy in space is often written as if delay were a harmless side effect. It is not. Slow qualification can be a security weakness of its own, because it extends dependence on aging platforms and traps programs inside old architectures whose weaknesses are already understood by competitors. That is one reason the next wave of policy should focus as much on speeding trusted substitution as on blocking unwanted sourcing. Trusted domestic and allied alternatives are only useful when they can be qualified, tested, certified, and produced in time to matter.
That means expanding test capacity, modernizing component qualification, funding second sources before a crisis, and using demand commitments where governments truly need assured access. It also means buying smarter. The state should not wait until a satellite prime submits a final design and then demand that an exposed foreign component be removed. By then, the redesign cost is already sunk into the program and the supplier base may already be locked. Control belongs earlier, at architecture definition, supplier screening, and interface design.
A tougher standard for software and digital support
The industry still tends to treat software-linked dependencies as fixable later. That habit is getting dangerous. Satellites are becoming more software-defined, more networked, more updateable, and more dependent on digital ground infrastructure. The purchasing state has to ask not only who built a unit, but who can patch it, revoke keys, alter behavior, access telemetry at the support layer, or degrade the system through an upstream service dependency. A foreign component rule written only for physical hardware would miss too much of the real exposure.
Governments should add digital support services, firmware maintenance, remote diagnostics, and mission-data processing chains to the same trust framework used for secure hardware. That will frustrate some buyers because software stacks are harder to map than a crate of parts. It is still the right move. A spacecraft with a domestic enclosure and a foreign-controlled software spine is not meaningfully sovereign.
What a smarter procurement rule would look like
A workable rule set would start with a short trusted-function list. Anything that controls spacecraft command authority, protected communications, cryptography, resilient positioning and timing, mission autonomy, propulsion, or sensor fusion would require domestic or trusted-allied sourcing, full ownership disclosure, firmware transparency, strong data-rights terms, and a credible second-source or recovery plan. The rule would not wait for final assembly to inspect compliance. It would attach at design review, supplier nomination, and major subcontract award.
Outside the trusted-function list, the default should be disclosure rather than prohibition. Contractors would report country of origin, production location, parent ownership, update authority, sole-source status, and lead times for defined categories. If the government later judged a dependency unacceptable, it could order mitigation with money and schedule attached. That is a far more realistic system than pretending governments can ban all foreign inputs without paying for the industrial consequences. They would pay, and they would pay heavily.
The political temptation is easy to understand
Foreign-component bans are attractive because they fit on podiums. They let governments sound forceful without explaining the hard work of qualification reform, industrial mapping, secure software auditing, and long-horizon procurement. They also align neatly with a period in which states are rediscovering industrial policy, trade screening, and technology controls across semiconductors, communications infrastructure, and defense production. Space sits inside that wider shift. It is not separate from it.
Still, space supply chains punish performative policy. The bill of materials is too deep, the qualification cycles are too long, and the mission consequences are too large. A slogan can win applause and still produce launch delays, grounded constellations, and thinner competition. That is why the better answer remains selective blocking paired with industrial build-out. Governments should block what they cannot safely trust, not what they can politically denounce.
Governments need a living control list, not a frozen rulebook
Space hardware changes too quickly for static sourcing bans written around yesterday’s parts. Governments should maintain a living control list for space procurement that is updated with input from launch providers, satellite primes, chip designers, test laboratories, intelligence agencies, and export-control officials. That list should identify which component categories are treated as trusted functions, which require domestic or trusted-allied sourcing, which can be accepted with mitigation, and which only require disclosure. It should also identify sunset provisions so a temporary restriction does not stay in force after domestic and allied capacity has matured.
That approach would reduce one of the worst habits in space policy: reacting to a crisis with a sweeping prohibition and leaving the consequences for program managers to absorb later. A living control list forces a government to explain what changed, why the component category moved, and what industry is supposed to do next. It also creates a more usable demand signal. Suppliers can invest when they know a government is not speaking in slogans but in specific procurement categories, qualification expectations, and multi-year buying plans.
Summary
The next fight will not be over whether a part is foreign. It will be over whether a government can prove who really controls the behavior of the system after launch. In the older procurement model, nationality was treated as a rough proxy for trust. In the newer model, that proxy is no longer enough. Firmware signing, remote administration, test-tool dependence, design-right ownership, and access to replacement capacity matter just as much as the passport attached to a supplier.
That change cuts both ways. It means some domestic-looking systems will fail a serious sovereignty test, while some allied systems will pass it comfortably. Governments that understand that distinction will build safer space architectures. Governments that settle for theatrical bans will spend years discovering that they blocked the visible dependency and left the invisible one in place.
Appendix: Top 10 Questions Answered in This Article
Should governments impose a blanket ban on all foreign components in space systems?
No. A blanket ban would raise costs, shrink supplier choice, and often miss the dependencies that matter most. A selective regime tied to trusted functions, ownership exposure, software control, and substitutability offers better protection.
Which foreign components deserve the strictest controls?
The toughest controls belong on trusted compute, secure communications modules, cryptographic elements, timing devices, mission software, and propulsion systems. These categories influence spacecraft behavior directly and are hard to replace quickly.
Why did the RD-180 matter so much in policy debates?
The RD-180 showed what happens when a strategically exposed foreign engine sits at the center of sensitive launch capability. The issue was not import status alone. It was the combination of mission importance, weak substitutability, and geopolitical exposure.
Do existing U.S. rules already screen foreign involvement in space supply chains?
Yes. Export controls, launch licensing, payload review, certification processes, and industrial security rules already create filters for foreign risk. The issue is less about inventing new authority and more about using current tools more precisely.
Is foreign ownership always disqualifying for space contractors?
No. U.S. industrial security practice allows some foreign-linked firms to operate under mitigation agreements when the government is satisfied that control risks are contained. That is different from hidden dependence on an untrusted supplier inside a mission system.
How is Europe approaching the same problem?
Europe is using the language of sovereignty, secure connectivity, and technological non-dependence. Programs linked to ESA and IRIS2 show a push to reduce exposure in semiconductors and other high-value component areas rather than walling off every import.
Can allied sourcing be treated as safe by default?
Not by default, but it should be treated differently from open global sourcing. Trusted allies with aligned export controls, security rules, and long industrial relationships present a different risk profile from opaque or adversarial suppliers.
Why can a broad ban damage the domestic industrial base?
Because many domestic alternatives are not ready at the same scale, speed, or qualification level. A sudden ban can delay programs, reduce competition, and favor only the largest firms that can afford redesign and requalification campaigns.
Why should software dependencies be included in foreign-component policy?
Spacecraft are updated and managed over time, which makes firmware, remote diagnostics, and digital support pathways part of the mission risk picture. A hardware-only rule can leave the most sensitive control layer untouched.
What is the strongest policy position advanced in this article?
Governments should reject blanket foreign-component bans and adopt a hard selective standard instead. The harshest restrictions should apply to mission-defining functions and adversarial dependencies, while lower-risk imports should face disclosure, audit, and mitigation rules rather than automatic exclusion.

