
Invisible entry point
There is no phishing link to avoid, no malicious contract to identify in advance. The attack arrives through infrastructure the user and protocol already trust. By design, nothing looks wrong until the transaction executes.

Systemic scale
A single compromised npm package with thousands of weekly downloads can reach every protocol in its dependency graph simultaneously. The attacker invests effort once and extracts value from the entire ecosystem. This is categorically different from one-at-a-time drainer attacks.

Hard to detect until damage is done
Post-execution monitoring, address screening, and code audits all operate on the wrong layer. The compromise is in the infrastructure. The damage manifests in transaction outcomes. The only detection layer that bridges these two is one that evaluates transaction behavior at execution time, before the blockchain confirms.