Skip to content

Attack Surface Overview

Security SpecialistOperations & Strategy

See where your protocol is most exposed. Click the checkbox on each vector to track your security posture. Your progress is saved locally in your browser.

0 of 12 vectors covered
0 secured0 in progress12 gaps
YourProtocolSmart ContractExploitsMultisigOperationalFailuresDPRK / ThreatActor HiringLeadershipPhishingInfrastructureCompromiseFrontend / DNSHijackingOperationalSecurityFailuresSupply ChainAttacksMonitoring &Alerting GapsSocialEngineeringDuressSituationsGovernanceAttacks
Smart Contract ExploitsCritical
Multisig Operational FailuresCritical
DPRK / Threat Actor HiringCritical
Leadership PhishingCritical
Infrastructure CompromiseCritical
Frontend / DNS HijackingCritical
Operational Security FailuresHigh
Supply Chain AttacksHigh
Monitoring & Alerting GapsHigh
Social EngineeringHigh
Duress SituationsHigh
Governance AttacksMedium