Surprising to hear that considering all the different components that can be attacked and abused... - Peer discovery - mempool - utxo set db - bitcoin script - pinning attacks Etc.
Have you ever taken a serious look at TLS/X.509/Certificate Authorities/DNS Poisoning/BGP Hijacking……..? :)
No, but it feels intuitive that something that serves one purpose (AFAIK) would have less attack vectors than one that has many endpoints.