Figment’s staking services and infrastructure were not impacted by the recent security attacks on September 8, 2025, including both the NPM Supply Chain and SwissBorg incidents. All client assets remain secure. As part of our ongoing commitment to security, we have conducted an additional investigation and verification of our resilience.
Staking Security and the Recent Events
The root causes of the most recent attacks on September 8 are under investigation by the parties involved, and as is customary when incidents like this occur, a technical post-mortem should follow.
Figment can only speak to our own infrastructure design and security procedures. As a reminder, Figment’s model is non-custodial. We do not hold or control customer assets. We also take a deliberately conservative approach to our engineering and security:
- Non-Custodial Infrastructure Model: Figment does not operate wallets with signing rights on customer assets. Customers maintain control of their keys, and our role is to provide secure validator infrastructure only.
- Separation of Duties: Our systems are architected so that Figment cannot move customer funds. We focus solely on validator performance and security, not custody.
- Safety over Liveness: We have deliberate conservatism in all of our engineering practices. This means we may intentionally take additional time to review changes before committing to updates including routine upgrades, new features, and outages. This due diligence is conducted specifically to prevent exposure to events like the NPM Supply Chain attack.
- Vendor Management: We treat vendor management as an extension of our own security program. Through a mandatory, risk-based review process, our Security and Legal teams ensure that every new vendor is a trusted partner that enhances our operational resilience.
- Defense-in-depth Architecture: Multi-cloud infrastructure, zero-trust access models, hardened key management, endpoint protection and continuous code analysis, multi-party change controls, and security oversight for all changes and new dependencies are the core pillars of our operating model.
- Continuous Monitoring and Testing: Our Security Team monitors and simulates both internal and external attack vectors, going beyond traditional penetration testing to mitigate the risk of potential threats.
Figment remains vigilant in our practices to keep our infrastructure and customers secure. Please reach out if you want to discuss any of this further or have additional questions.