Different hardware wallets have different secure models and tradeoffs to defend against various types of attacks.
nostr:npub1az9xj85cmxv8e9j9y80lvqp97crsqdu2fpu3srwthd99qfu9qsgstam8y8 and Lloyd Fournier discuss some of these attacks, and how the risks can be minimized, in BR073.