Very few systems (if any at all) can be considered impossible to penetrate. It's just a question of how much interest there is to break them and who is doing the breaking.
How can it be hacked if it's not connected to the internet and if the seed & all user data gets wiped when the device shuts down or reboots?
No wifi. No bluetooth. USB not plugged in.