Currently I have the most air gapped solution where my cold storage hasn't once been connected to my laptop at any point.
In that case, it's completely safe.
That's considering that you haven't exported any of your air-gap wallet's private key, even one.
Because if you do, if compromised, it can be used together with the extended public key in the online machine to compute all of your other private keys.
Otherwise, it's safe.
Is my sparrow wallet at all compromised for having connected to public servers in the past? If so, is there anything I can do to ensure my funds don't get stolen via man in the middle attack once I set up my own node? (i.e. delete and reinstall Sparrow) Currently I have the most air gapped solution where my cold storage hasn't once been connected to my laptop at any point. Thank you for the help!
The public server and the MITM attacker don't have access to users' private keys even in a non-air-gap setup anyways.
All it can access are privacy-related data which are your transactions and addresses, and as you know it, fake the data that you receive.
SPV wallets sign transactions locally.
(
this is considering Sparrow doesn't have bugs that will lead to the attacker to intercept the private key in another way, so keep it air-gap)
The warnings about it's unsafe to access your air-gap machine (
PC) in an online environment is because that will defeat its purpose.
It may or may still be safe depending on the online device's security but it's not "
air-gap" anymore once connected to the internet even after disconnection.