Avail is a data availability layer, which means its BLS12-381 attestations are load-bearing for every rollup that uses it. If Shor forges an Avail DA attestation, the chains downstream do not know. This is the quiet systemic risk: the layer you forget about is the one you cannot afford to get wrong.
Summary
Avail is a Substrate-based DA layer using Sr25519 accounts, BLS12-381 validator sigs, and KZG commitments for data availability proofs. All primitives Shor-vulnerable. KZG DA commitments are a systemic risk: Shor-forged DA attestations would undermine every downstream rollup. No PQC roadmap.
What the gates say
- Hybrid: FAIL. No hybrid plan on file.
- Evidence: PASS. Sources reconstructable by third party.
- Primitive naming: PASS. Named primitives at every scored sub-level.
Burn-vs-rescue policy on file
undeclared
Seven dimensions
Each dimension scores 0-100 internally; the weighted roll-up produces the QRI on the left. Open a row to read the sub-score detail.
1 Cryptographic Exposure 28 / 100
Substrate DA layer with KZG commitments for data availability proofs.
Sr25519 (Schnorr over Ristretto25519) · BLS12-381 (DA committee) · KZG commitments (data availability) · BLAKE2b-256No PQC families
No NIST PQC
2 HNDL Exposure 20 / 100
Substrate-style SS58 addresses; pubkeys visible.
Mainnet launched July 2024; young chain. DA data is stored off-chain but attestations permanent.
DA attestations (BLS12-381 validator sigs) and KZG commitments forgeable post-Shor — retrodecryption risk to downstream rollups.
Standard libp2p noise.
3 Metadata & Privacy Exposure 20 / 100
Transparent DA layer — rollup data blobs publicly queryable.
OnFinality, Dwellir, Avail-official.
Avail Nexus bridges DA attestations to multiple L1s (Ethereum, etc).
KZG commitments retrodecrypted post-Shor would enable attacker to forge DA attestations for any rollup.
4 Migration Architecture 38 / 100
Substrate runtime upgrades via forkless runtime change. KZG hard to swap (DA core primitive).
Standard Substrate proxy/multisig.
Short track record (~21 months mainnet).
No hybrid plan. Polkadot ecosystem-wide PQC would be upstream.
5 Deployment Execution 2 / 100
no public artifact found
no PQC in Avail runtime
105 validators, no PQC keys
no PQC milestones
No PQC announcements
6 Supply Chain Vendor Readiness 5 / 100
7 Governance & Coordination 35 / 100
105 validators, Nakamoto coef 34 (strong).
Short history; Substrate forkless upgrades.
Avail team led by Anurag Arjun (ex-Polygon).
No precedent.
The X + Y vs Z inequality
X (data shelf life): 10+ (DA attestations remain verifiable by rollups indefinitely — high shelf life)
Y (migration time): 10-15
Z10 (10% CRQC year): 2036 · Z50 (50%): 2041
Verdict: X+Y > Z (danger).
Four-scenario grid
| Scenario | Value preserved | Privacy preserved |
|---|---|---|
| quantum never | 100% | 100% |
| arrives suddenly pre migration | 10% | 10% |
| arrives slowly post migration | 75% | 60% |
| arrives slowly mid migration | 40% | 25% |
Peers in the L1 profile
Order-book view of the 9 chains closest to Avail by QRI.
Public artifacts used for this scorecard
Each entry below is a sub-score citation. Clicking the link takes you to the public source. A third party should be able to reconstruct every number on this page from these URLs in 48 hours.
Substrate DA layer with KZG commitments for data availability proofs.
Supply chain snapshot
A chain's supply chain cannot migrate faster than its slowest dependency. Zero PQC roadmaps in any of the four categories is a structural blocker, not a lagging indicator.
Analyst notes on the scoring
Systemic role as DA layer amplifies its quantum exposure risk — multiple rollups inherit Avail's crypto. Young chain (July 2024 mainnet). Strong Nakamoto coefficient (34) is one bright spot.
Scorecard metadata
- Profile: L1
- Scored: 2026-04-18 by
layerqu-v2-scoring-agent-1 - v1 reference:
chainscreen-v1-archive - QRI raw: 15 · after caps: 15
- Confidence interval: ±15
- PQC washing ratio: 1x
- Burn-vs-rescue: undeclared
Caps triggered
- mosca_cap_60
- sutor_stage_cap_2
- casado_stage_cap_3
- preskill_half_dim2_dim3_dim5_dim6
- hybrid_gate_fail_cap_60