WalletBeat Logo

Security

How secure is your wallet?

WalletSecurity auditsScam preventionChain verificationHardware wallet supportPasskey implementation
GridPlus Wallet
UNRATED
UNRATED
UNRATED
UNRATED
UNRATED
Keystone Wallet
UNRATED
UNRATED
UNRATED
UNRATED
UNRATED
Ledger Wallet
UNRATED
UNRATED
UNRATED
UNRATED
UNRATED
OneKey Pro
UNRATED
UNRATED
UNRATED
UNRATED
UNRATED
Trezor Wallet
UNRATED
UNRATED
UNRATED
UNRATED
UNRATED
Cypherock Wallet
UNRATED
UNRATED
UNRATED
UNRATED
UNRATED
Firefly Wallet
UNRATED
UNRATED
UNRATED
UNRATED
UNRATED

Scam prevention

Transactions in Ethereum are very difficult to reverse, and there is no shortage of scams. Wallets have a role to play in helping users avoid known scams ahead of the user making the transaction.

Hardware Wallet dApp Signing

dApp Signing is a critical security feature for hardware wallets that allows users to verify transaction details directly on their hardware wallet's screen before signing. This verification step is crucial for preventing attacks where malicious software might attempt to trick users into signing transactions with different parameters than what they intended.

	Without dApp signing, users must trust that the software wallet is displaying the correct
	transaction details and not manipulating them. With dApp signing, the hardware wallet shows
	the actual transaction details that will be signed, providing an independent verification
	mechanism that significantly enhances security.
	
	Full dApp signing implementations ensure that all relevant transaction details (recipient
	address, amount, fees, etc.) are clearly displayed on the hardware wallet screen, EIP-712 message hashes,
    and decoded calldata, allowing users to make informed decisions before authorizing transactions.

Hardware wallet integration

Software wallets that integrate well with hardware wallets provide users with the best of both worlds: the convenience and feature-rich interface of software wallets, combined with the security of hardware key storage and transaction signing.

EIP-712 clear signing is particularly important for DeFi applications like Safe (formerly Gnosis Safe) and Aave, where complex transaction parameters need to be verified to prevent attacks like blind signing exploits or transaction parameter manipulation.

When a software wallet properly integrates with hardware wallets for clear signing on these platforms, users can confidently verify exactly what they're approving on their hardware device screen, even for complex smart contract interactions.

Without proper integration, users may be forced to blind sign transactions or use less secure methods, significantly increasing security risks when interacting with DeFi protocols.

Bug Bounty Program

Hardware wallets manage sensitive cryptographic keys and access to users' funds, making them high-value targets for attackers. Bug bounty programs incentivize security researchers to responsibly discover and disclose vulnerabilities, rather than exploit them.

A well-structured bug bounty program:

  1. Provides clear guidelines for researchers to report vulnerabilities
  2. Offers appropriate rewards based on severity of findings
  3. Demonstrates a commitment to addressing security issues quickly
  4. Communicates transparently about discovered vulnerabilities and their resolution

Additionally, hardware wallets should provide upgrade paths for users when critical security issues are discovered, as these physical devices can't always be fixed with simple software updates.

Supply Chain Factory

Ensuring the security and transparency of the factory supply chain is vital to prevent tampering or compromise during manufacturing, packaging, and delivery. Users need confidence that the device they receive is genuine and hasn't been maliciously altered.

Firmware

Firmware security and openness are critical for user trust, resistance against attacks, and ensuring the device can be safely upgraded. Users need assurance that the code running on their device is authentic and hasn't been tampered with. Openness allows for independent verification and community audit.

Keys Handling

Secure key handling is fundamental to the security of user funds. This includes how the master secret (seed) is generated, stored, and used. The device must protect keys from extraction via software or physical attacks (both passive side-channels and active fault injection). It should also ensure that the manufacturer cannot access or recover user keys.

User Safety

User safety features are crucial for ensuring users clearly understand the transactions and messages they are signing on their hardware device. This involves presenting information legibly (human-readable addresses/contracts/parameters), providing tools to verify raw data, offering risk analysis and transaction simulation, and preventing unintended actions.