Skip to content

Supply Chain Security

Engineer/DeveloperSecurity SpecialistDevops

Authored by:

Sara Russo
Sara Russo
SEAL

🔑 Key Takeaway: Your software is only as secure as its weakest dependency. Supply chain security means knowing what you depend on, verifying its integrity, and having a plan for when something in your chain is compromised.

Supply chain security covers everything between your source code and your users. In traditional software, that mostly means npm packages and third-party libraries. In Web3, the chain is longer and the consequences are more severe: frontend code interacts directly with wallets, smart contracts hold real value, and infrastructure providers make decisions your contracts rely on. Attackers who understand this do not need to compromise your code directly. They target the libraries you import, the CDNs that serve your frontend, the RPC endpoints your app trusts, and the contractors your team onboards.

These are not theoretical risks. Attacks targeting npm packages, wallet connector libraries, and compiler toolchains have resulted in hundreds of millions of dollars in losses across the Web3 ecosystem.

What Makes Up a Web3 Supply Chain?

A Web3 project's supply chain includes every external component between your source code and your users:

  • Code dependencies: npm packages, Solidity libraries, Rust crates, and their transitive dependencies
  • Frontend delivery: CDNs, hosting providers, wallet connector libraries, and the scripts served to users' browsers
  • Build tooling: Compilers (solc), development frameworks (Hardhat, Foundry), CI/CD pipelines
  • Infrastructure providers: RPC nodes, indexers, oracle networks, bridge relayers
  • Hardware: Signing devices, hardware wallets, HSMs
  • Human supply chain: Contractors, freelancers, open-source contributors

A compromise at any point in this chain can affect your users.

What This Framework Covers

This framework provides practical guidance for securing each layer of your supply chain:

  1. Dependency Awareness: Manage external packages securely, including version pinning, lockfile integrity, vulnerability scanning, and protection against typosquatting.
  2. Web3 Supply Chain Threats: The specific threat vectors that affect Web3 projects, from frontend library hijacking to infrastructure compromise and hardware tampering.
  3. Supply Chain Levels for Software Artifacts: Classify your components by risk level and apply proportional controls.
  4. Vendor Risk Management: Evaluate and monitor third-party providers including RPC services, oracle networks, security auditors, and contractors.
  5. Supply Chain Incident Response: What to do when a dependency or provider is compromised, including Web3-specific response scenarios.

Related Frameworks

Supply chain security intersects with several other areas covered in this project: