This needs more thought, but here is a first stab at trying to put this in a broader context. The aim is to help non-network developers appreciate the role of your approach by putting it in a context for which they already have a mental model of the technology (operations layer) and a mental model of the business (application layer).
Thinking in terms of the "Service-Mesh" (a fluid framework/definition), what is going on here is network layer counterpart - some degree of "Network-Mesh", say psuedo-meshnet, or quasi-meshnet in established network parlance.
Maybe a cloud-meshnet encapsulates both the domain, and the constraints that domain imposes. Any incompleteness in terms of a meshnet definition is not by design nor configuration choices, but rather is imposed by the constraints of the cloud environment.
Issue #2 allows the FRR managed layer to be dynamic.
WireGuard provides the peerless property but leaves the dynamic property to some external process(es) - the re-resolver scripts and services.
CIAB is a specific implementation of a cloud-meshnet.
This implementation is characterized by the choice of software stack and not by the functionality offered.
None the less, done properly, I think this should help contextualized and motivate a use case that is quite general: provide the "Service-Meshes" ( Istio, Linkerd, AWS App Mesh, HashiCorp Consul Connect, Open Service Mesh) a network layer that abstracts insecurely connected, ephemeral cloud instances running across cloud vendors wih heterogeneous cloud models and APIs.