hardened_malloc comes from GrapheneOS, and is implemented in secureblue as well as @anon80358587 's Brace toolkit. It is described by GrapheneOS as
a security-focused general purpose memory allocator
leveraging modern hardware capabilities to provide substantial defenses against the most common classes of vulnerabilities (heap memory corruption) along with reducing the lifetime of sensitive data in memory.
There might be something to be gained by tuning sysctl’s further. I haven’t looked into that. Disabling coredumps might also be worth considering. OpenWrt packages Chrony and assuming it supports NTS you could simply use that instead of the default ntp applet if NTS matters to you. run0 implies systemd and you probably don’t want to go that route. OpenWrt does have SELinux but it is opt-in because its potentially labor intensive.
OpenWrt is pretty good. By default it has a very specific purpose and profiles for specific targets which means that less code is needed which means smaller attack surface. I would not compare OpenWrt to a general purpose desktop or server.
There is a problem with bulldozing approach - there are many platforms not supporting kernel audit to collect selinux backscatter or having 8MB flash where chrony plainly does not fit.
But if you filter and match what does not consume extra resources you be getting somewhere…