Attack Surface Overview
See where your protocol is most exposed. Click the checkbox on each vector to track your security posture. Your progress is saved locally in your browser.
Smart Contract ExploitsCritical
Multisig Operational FailuresCritical
DPRK / Threat Actor HiringCritical
Leadership PhishingCritical
Infrastructure CompromiseCritical
Frontend / DNS HijackingCritical
Operational Security FailuresHigh
Supply Chain AttacksHigh
Monitoring & Alerting GapsHigh
Social EngineeringHigh
Duress SituationsHigh
Governance AttacksMedium