Yes, bugs do always exist; so, we layer security
Meltdown burned through all of it.
I disagree. I consider only remotely exploitable privilege escalations as such.
Meltdown meant virtual memory protections are circumventable on certain processor architectures, unless relatively costly software workarounds are applied. As such, it was a very serious local privilege escalation risk. As a silicon design bug on more than one design, it was unusual and widespread, affecting all operating systems running on such hardware. But it did not "burn through all security".
The difference between what's a layer and what's a link is hard to predict.
I don't follow. What do you mean by 'link'? By 'layer', I refer to each security promise or guarantee, as they are structured and rely on each other to provide the overall security in a system.
The first 'layer' is input filtering and buffer overrun protection in userspace applications.
The second 'layer' is process isolation and kernel-userspace barrier via virtual memory.
The third 'layer' is the kernel verifying parameters and scrubbing kernel-internal information in unused registers and userspace-visible structures when returning to userspace.
Each of these can be split into security sub-promises, of course. While these are traditionally described as a stack, a graph would be more correct.
In Unix/POSIX systems, for example, it has always been typical that application binaries are not writable by normal users (without privilege escalation). This means that even if you manage to inject code into a running user process, it is nontrivial for that process to infect other binaries. This, too, is a security 'layer', only a purely userspace design one.
_ _ _
There is no difference to the
userspace security under monolithic and microkernels: all currently known designs can be implemented under both equally well. The main security difference is that microkernels have internal privilege separation, similar to userspace processes, within the kernel itself; whereas monolithic kernels are more similar to a single userspace process.
Replacing all of that with the security promises a programming language provides is a ridiculous trade.