Has Hardware vulnerabilities been on the design

Has Hardware vulnerabilities been a forethought? If not why not can anyone give me a catchup please >links

I think that this concept is the closest thing in regards to addressing the hardware vulnerabilities: