{
  "chain_slug": "secret-network",
  "name": "Secret Network",
  "scorecard_profile": "privacy-L2",
  "evaluated_at": "2026-04-18",
  "evaluator": "layerqu-v2-scoring-agent-4",
  "v1_reference": "chainscreen-v1-archive",
  "dimensions": {
    "1_cryptographic_exposure": {
      "weight": 0.12,
      "score": 32,
      "sub_scores": {
        "1a_primitive_inventory": {
          "score": 14,
          "primitives_named": [
            "Ed25519 (CometBFT consensus)",
            "secp256k1 (Cosmos SDK accounts)",
            "SHA-256",
            "Intel SGX attestation (ECDSA + RSA)"
          ],
          "evidence": [
            "Secret Network docs",
            "Cosmos SDK docs"
          ]
        },
        "1b_shor_grover_pq_tag": {
          "score": 14,
          "tags": {
            "Ed25519": "Shor-break",
            "secp256k1": "Shor-break",
            "SHA-256": "Grover-weaken",
            "SGX attestation ECDSA/RSA": "Shor-break"
          }
        },
        "1c_algorithm_family_diversity": {
          "score": 0,
          "families_represented": 0,
          "families": []
        },
        "1d_nist_security_category": {
          "score": 0,
          "mappings": {}
        },
        "1e_implementation_quality": {
          "score": 4,
          "formal_verification": "none",
          "constant_time": "standard",
          "libraries": [
            "secret-core fork of Cosmos SDK"
          ],
          "evidence": [
            "https://github.com/scrtlabs/SecretNetwork"
          ]
        }
      },
      "total_artifacts": 2
    },
    "2_hndl_exposure": {
      "weight": 0.1,
      "score": 20,
      "sub_scores": {
        "2a_active_key": {
          "score": 4,
          "note": "secp256k1 + Ed25519 pubkeys exposed."
        },
        "2b_cold_key": {
          "score": 4,
          "note": "Same."
        },
        "2c_sig_long_term": {
          "score": 6,
          "note": "Tx-once for accounts; validator keys persistent."
        },
        "2d_encryption_conf": {
          "score": 6,
          "note": "SGX seal keys protect private contract state. SGX attestation ECDSA break forges attestations → possibly unseal."
        }
      },
      "total_artifacts": 1
    },
    "3_metadata_privacy_exposure": {
      "weight": 0.25,
      "score": 40,
      "sub_scores": {
        "3a_graph_visibility": {
          "score": 14,
          "note": "Privacy is smart-contract-level (TEE-sealed state). Tx graph at consensus layer is partially visible (sender/gas) but payload is encrypted via SGX."
        },
        "3b_rpc_concentration": {
          "score": 10,
          "note": "Figment, Keplr-hosted RPC."
        },
        "3c_bridge_correlation": {
          "score": 8,
          "note": "IBC bridges leak metadata."
        },
        "3d_retroactive_deanon": {
          "score": 8,
          "note": "Privacy is TEE-based (SGX), not crypto-based — different quantum profile. Shor break of SGX attestation ECDSA could enable attestation forgery but does not directly decrypt sealed state. Sealed state depends on SGX seal keys (AES-like), only Grover-weakened. Better retroactive posture than zk-SNARK privacy chains."
        }
      },
      "total_artifacts": 2
    },
    "4_migration_architecture": {
      "weight": 0.12,
      "score": 25,
      "sub_scores": {
        "4a_crypto_agility": {
          "score": 6,
          "note": "Cosmos SDK module-based. PQC signature module addable via module upgrade."
        },
        "4b_aa_key_rotation": {
          "score": 5,
          "note": "Standard Cosmos accounts."
        },
        "4c_hard_fork_track_record": {
          "score": 10,
          "note": "Multiple upgrades. CometBFT coordination."
        },
        "4d_hybrid_deployment_readiness": {
          "score": 4,
          "note": "Not architected."
        }
      },
      "total_artifacts": 1
    },
    "5_deployment_execution": {
      "weight": 0.18,
      "score": 0,
      "sub_scores": {
        "5a_mainnet_pqc_pct": {
          "score": 0,
          "mainnet_pqc_pct": 0,
          "evidence": []
        },
        "5b_pqc_code_in_consensus": {
          "score": 0,
          "loc_or_bytes": 0
        },
        "5c_validator_pqc_keys": {
          "score": 0,
          "pct": 0
        },
        "5d_published_milestones": {
          "score": 0,
          "count": 0,
          "milestones": [],
          "note": "DoraFactory cosmos-pqc is external reference; Secret has no own milestones."
        },
        "5e_pqc_washing_delta": {
          "score": 0,
          "ratio": 1
        }
      },
      "total_artifacts": 0
    },
    "6_supply_chain_vendor_readiness": {
      "weight": 0.18,
      "score": 5,
      "sub_scores": {
        "6a_wallet": {
          "score": 2,
          "top3": [
            "Keplr",
            "Leap Wallet",
            "Fina"
          ],
          "pqc_roadmap_count": 0
        },
        "6b_bridge": {
          "score": 1,
          "top3": [
            "IBC",
            "Axelar"
          ],
          "pqc_roadmap_count": 0
        },
        "6c_custodian": {
          "score": 1,
          "top3": [
            "Coinbase Custody",
            "BitGo"
          ],
          "pqc_roadmap_count": 0
        },
        "6d_rpc_hsm": {
          "score": 1,
          "top3": [
            "Figment",
            "Ankr"
          ],
          "pqc_roadmap_count": 0
        }
      },
      "total_artifacts": 1
    },
    "7_governance_coordination": {
      "weight": 0.05,
      "score": 35,
      "sub_scores": {
        "7a_validator_stake_distribution": {
          "score": 7,
          "note": "80 validators."
        },
        "7b_upgrade_cadence_under_pressure": {
          "score": 10,
          "note": "Multiple upgrades, SecretAI/SecretVM pivots."
        },
        "7c_named_coordination_lead": {
          "score": 10,
          "note": "SCRT Labs."
        },
        "7d_adversarial_coordination_precedent": {
          "score": 8,
          "note": "Multiple SGX vulnerability responses."
        }
      },
      "total_artifacts": 1
    }
  },
  "gates": {
    "hybrid_deployment": "FAIL",
    "evidence_reconstruction": "PASS",
    "primitive_naming": "PASS"
  },
  "caps_applied": [
    "Mosca (5a<20%)",
    "Sutor (5d=0)",
    "Preskill (<3 artifacts several dims → ×0.5)",
    "Casado",
    "Hybrid gate FAIL → QRI cap 60"
  ],
  "qri": {
    "raw": 14,
    "after_caps": 12,
    "ci_plus_minus": 15,
    "band": 2,
    "band_name": "Acknowledged"
  },
  "migration_stage": 0,
  "mosca_inequality": {
    "X_signature_shelf_life_years": "10-15 (sealed contract state long-lived)",
    "Y_migration_time_years_range": "10-15",
    "Z_10pct_year": 2036,
    "Z_50pct_year": 2041,
    "danger_zone_at_50pct": true
  },
  "four_scenario_grid": {
    "quantum_never": {
      "value_preserved_pct": 100,
      "privacy_preserved_pct": 100
    },
    "arrives_suddenly_pre_migration": {
      "value_preserved_pct": 5,
      "privacy_preserved_pct": 45
    },
    "arrives_slowly_post_migration": {
      "value_preserved_pct": 75,
      "privacy_preserved_pct": 65
    },
    "arrives_slowly_mid_migration": {
      "value_preserved_pct": 30,
      "privacy_preserved_pct": 45
    }
  },
  "burn_vs_rescue_policy": "undeclared",
  "pqc_washing_ratio": 1,
  "vendor_tile_summary": {
    "wallet": {
      "top3": [
        "Keplr",
        "Leap Wallet",
        "Fina"
      ],
      "pqc_roadmap_count": 0
    },
    "bridge": {
      "top3": [
        "IBC",
        "Axelar"
      ],
      "pqc_roadmap_count": 0
    },
    "custodian": {
      "top3": [
        "Coinbase Custody",
        "BitGo"
      ],
      "pqc_roadmap_count": 0
    },
    "rpc_hsm": {
      "top3": [
        "Figment",
        "Ankr"
      ],
      "pqc_roadmap_count": 0
    }
  },
  "narrative_summary": "Secret Network uses SGX TEE-based privacy (not crypto-based). Band 2 (Acknowledged). Different retroactive profile from zk-privacy chains: Shor breaks attestation ECDSA (forgery enabled) but does not directly decrypt sealed state (AES seal keys only Grover-weakened). Stronger privacy preservation than Penumbra in quantum-suddenly scenario. Zero PQC work at chain level.",
  "evaluator_notes": "TEE-privacy retroactive-deanon profile markedly better than zk-privacy: sealed state survives Shor. Privacy_preserved_pct=45% in sudden-pre-migration (vs 0% for Penumbra) reflects SGX seal key survivability. SGX hardware faults (classical) are bigger near-term risk.",
  "narrative_voiced": "Secret Network is the one privacy chain where the quantum picture is mostly good news. Confidentiality is TEE-based. SGX seal keys are AES-flavour, Grover-weakened but not Shor-broken. Sealed state survives where zk-SNARK privacy does not: 45% privacy preserved in the worst-case scenario versus 0% for Penumbra."
}