Depends on your setup. If you're using an air-gapped device that makes no use of random number generation, then the attacker can't take advantage of it to sign with insecure k-values (as an example). Transactions are signed using the RFC 6979 which doesn't generate random k-values. You would also need to use dice or coin to generate the entropy of your wallet. In that case, and by assuming the OS does not hide any backdoors for the specific type of wallet software you will use, then it's safe to assume you'll be fine.
I have always wondered what can affect the RNG and generating keys with enough entropy? For instance, do we know which hardware and software are always good sources of entropy and which aren't? Is there a list of models and versions that are specially good or bad? Also, can a good source of entropy suddenly go "bad" and generate insufficient entropy due to hardware defects or software misconfiguration?
I never gave it much thought.