Skip to content

Attack Surface Overview

See where your protocol is most exposed. Click the checkbox on each vector to track your security posture. Your progress is saved locally in your browser.

0 of 12 vectors covered
0 secured0 in progress12 gaps
YourProtocolSmart ContractExploitsMultisigOperationalFailuresDPRK / ThreatActor HiringLeadershipPhishingInfrastructureCompromiseFrontend / DNSHijackingOperationalSecurityFailuresSupply ChainAttacksMonitoring &Alerting GapsSocialEngineeringDuressSituationsGovernanceAttacks
Smart Contract ExploitsCritical
Multisig Operational FailuresCritical
DPRK / Threat Actor HiringCritical
Leadership PhishingCritical
Infrastructure CompromiseCritical
Frontend / DNS HijackingCritical
Operational Security FailuresHigh
Supply Chain AttacksHigh
Monitoring & Alerting GapsHigh
Social EngineeringHigh
Duress SituationsHigh
Governance AttacksMedium