Web3 Supply Chain Exposure Assessment

Web3 supply chain attacks don't happen on-chain — they happen before signing.

Compromised frontends, poisoned dependencies, manipulated RPCs. Does your stack detect the modified transaction before it reaches the chain? 2 minutes.

1
Business type
2
7 questions
3
Your exposure
⚙️
Protocol / dApp
DeFi protocol, NFT platform, or smart contract application with direct user interactions
🏦
Exchange / Custodian
CEX, OTC desk, custodial wallet, or crypto bank managing customer funds at scale
🔐
Wallet / Infrastructure
Wallet provider, RPC service, SDK, or developer tooling used by downstream builders
📋
Compliance / Risk / Security
Internal risk function, security team, or compliance officer evaluating Web3 controls
Web3 Supply Chain Exposure Assessment

7 questions across your actual attack surface.

Frontend, dependencies, RPC, simulation, policy enforcement. Answer for what is live in production today.

1
Business type
2
7 questions
3
Your exposure
0 of 7 answered0%
01/07 — Frontend & Dependency Attack Surface

Does your transaction pipeline touch external npm packages, frontend JS libraries, CDN-hosted scripts, or third-party SDKs?

Ledger Connect Kit, Squarespace DNS hijack, Slope wallet — all exploited this layer. A single compromised package modifies transaction calldata before signing.
Yes — including auto-updated or CDN-hosted dependencies
Malicious JS injected at the CDN or package level modifies transactions before they reach the signing layer
High risk
Yes — version pinned, with review on updates
Reduces attack frequency but a compromised pinned version still deploys undetected
Partial
Minimal — transaction construction uses internally controlled code only
External dependency surface deliberately minimized and independently verified
Controlled
02/07 — RPC Layer Integrity

Do you independently validate responses from your RPC provider — or does your stack trust what the RPC returns?

A malicious or compromised RPC can return altered state data, substitute transaction parameters in-flight, or shadow legitimate calls. Most stacks never check.
Yes — RPC responses are cross-validated against independent sources
Substituted or altered transaction data would be detected before it reaches the signing layer
Controlled
Partially — some validation exists on critical paths
Lower-value or routine RPC calls pass without independent verification
Partial
No — we trust our RPC provider implicitly
A compromised or malicious RPC alters transactions with no detection mechanism in place
High risk
03/07 — Pre-Signature Transaction Simulation

Before broadcast, do you simulate the actual on-chain outcome of the transaction?

Stops: malicious frontend altering calldata, dependency-injected contract interactions, RPC parameter substitution. Simulation is the only control layer where supply chain modifications become visible before execution.
Yes — every transaction simulated before broadcast
Altered calldata, unexpected approvals, or substituted destinations surface in simulation output before execution
Controlled
High-value or flagged transactions only
Routine transactions bypass simulation — supply chain attacks target exactly this coverage gap
Partial
No — transactions are not simulated before execution
The only detection point is removed — modified transactions reach the chain unverified
High risk
04/07 — Outcome vs Intent Verification

Do you verify that what the transaction will actually do matches what the user or system intended — destination, approval scope, function called?

Stops: compromised frontend displaying correct intent while signing something different. This is the control that closes the gap supply chain attacks are specifically designed to exploit.
Yes — outcome automatically verified against declared intent
Destination, approval scope, and function calls validated before execution
Controlled
Partially — some parameters checked, not all
Approval scope or destination manipulation may still go undetected
Partial
No — transaction construction is trusted as-is
No independent outcome verification exists
High risk
05/07 — Behavioral Anomaly Detection

Do you compare transactions against established behavioral baselines — destinations, approval scope, counterparties, value flow?

Stops: supply chain attacks introducing abnormal transaction behavior, silent parameter manipulation that passes static checks. Behavioral deviation is often the only observable fingerprint of a supply chain compromise.
Yes — behavioral baselines established and monitored
Deviations from established patterns trigger alerts or blocks
Controlled
Limited — static rules exist but no behavioral baselines
Novel attack patterns that fall outside defined rules are missed
Partial
No — transaction patterns are not monitored
Anomalous destinations or expanded approvals go undetected
High risk
06/07 — Policy Engine Enforcement

Can you automatically hold or block a transaction before it reaches the network — based on its simulated outcome or behavioral deviation?

Stops: execution of compromised transactions even when upstream systems fail. Outcome: allow, deny, or escalate before broadcast. This is the enforcement layer — detection without enforcement is observation, not control.
Yes — automated policy enforcement blocks or holds anomalous transactions
Transactions failing checks are stopped before broadcast automatically
Controlled
Manual review only
Fast-moving attacks operate within windows shorter than manual review
Partial
No — transactions go directly to network
Once broadcast, a transaction cannot be stopped
High risk
07/07 — Last Line of Defense

Others secure the code. But if your frontend, dependency, or RPC was already compromised and silently altered a transaction — would your stack catch it before broadcast?

SBOM scanning, dependency monitoring, and code integrity checks all operate upstream. This question asks about what happens when those controls fail.
Yes — transaction outcome verification would catch the modification
An independent control layer validates what executes, not just what the source says should execute
Controlled
Not sure — I can't confirm we'd detect it before broadcast
"Not sure" here means the answer is almost certainly no — this layer is either absent or not clearly owned
Uncertain
No — a silent modification would reach the network undetected
The attack completes before any control in the current stack can act on it
High risk
Optional — helps tailor your results
Monthly transaction volume
Primary chain
1
Business type
2
7 questions
3
Your exposure

Assessment confidence:
Exposure Score
out of 14 maximum
Critical Gaps
uncontrolled vectors
Partial Controls
incomplete coverage
Business Type
// Threat → Control → Outcome — What Your Profile Means
// Likely Attack Path — Based on Your Missing Controls
Profile-specific

In your current setup, this attack would be detected:
// Missing Controls — and the Attacks They Allow