Depends on your setup. If you're using an air-gapped device that makes no use of random number generation, then the attacker can't take advantage of it to sign with insecure k-values (as an example). Transactions are signed using the RFC 6979 which doesn't generate random k-values. You would also need to use dice or coin to generate the entropy of your wallet. In that case, and by assuming the OS does not hide any backdoors for the specific type of wallet software you will use, then it's safe to assume you'll be fine.
I have always wondered what can affect the RNG and generating keys with enough entropy? For instance, do we know which hardware and software are always good sources of entropy and which aren't? Is there a list of models and versions that are specially good or bad? Also, can a good source of entropy suddenly go "bad" and generate insufficient entropy due to hardware defects or software misconfiguration?
I never gave it much thought.
These are very intriguing question which appeals to the imagination of many researchers in the field. NIST has developed the software set that
and almost each year organizes numerous workshops on this matter where you can find some answers. I would focused on Random Bit Generation Workshop series and Entropy Source Validation Workshop, Just go to
and search.