Centralized Risks in Decentralized Projects: Mapping Your Complete Attack Surface