In my design FX3 firmware is loaded from EEPROM. I want to be sure that after firmware is loaded, it cannot be modified from USB host using A0h vendor request. Maybe I’m too paranoid, but I would like to eliminate a possibility that some bad guy can modify a firmware to destroy expensive hardware. Like a hacker can write a virus to destroy all our hardware around the world.
So the question is how to disable A0h request? Or maybe it is only processed in bootloader code during USB boot and is not available after firmware been loaded? That would be ideal.
Unless you wrote a handling routine for A0 request in your firmware, the loaded custom firmware does not support the "backdoor". This is different to the FX2.