Watchlist 0
SECRET NETWORK · privacy-L2 · QRI 12 · BAND 2 Acknowledged Hybrid FAIL · Stage 0 · Washing 1x

Secret Network is the one privacy chain where the quantum picture is mostly good news. Confidentiality is TEE-based. SGX seal keys are AES-flavour, Grover-weakened but not Shor-broken. Sealed state survives where zk-SNARK privacy does not: 45% privacy preserved in the worst-case scenario versus 0% for Penumbra.

inLinkedIn XPost Scorecard JSON Compare Verified 2026-04-18

Summary

Secret Network uses SGX TEE-based privacy (not crypto-based). Band 2 (Acknowledged). Different retroactive profile from zk-privacy chains: Shor breaks attestation ECDSA (forgery enabled) but does not directly decrypt sealed state (AES seal keys only Grover-weakened). Stronger privacy preservation than Penumbra in quantum-suddenly scenario. Zero PQC work at chain level.

What the gates say

  • Hybrid: FAIL. No hybrid plan on file.
  • Evidence: PASS. Sources reconstructable by third party.
  • Primitive naming: PASS. Named primitives at every scored sub-level.

Burn-vs-rescue policy on file

undeclared

Seven dimensions

Each dimension scores 0-100 internally; the weighted roll-up produces the QRI on the left. Open a row to read the sub-score detail.

1 Cryptographic Exposure 32 / 100
1a_primitive_inventory 14 / 20
Primitives: Ed25519 (CometBFT consensus) · secp256k1 (Cosmos SDK accounts) · SHA-256 · Intel SGX attestation (ECDSA + RSA)
Evidence: Secret Network docs · Cosmos SDK docs
1b_shor_grover_pq_tag 14 / 20
1c_algorithm_family_diversity 0 / 20
1d_nist_security_category 0 / 20
1e_implementation_quality 4 / 20
Evidence: github.com
2 HNDL Exposure 20 / 100
2a_active_key 4 / 20

secp256k1 + Ed25519 pubkeys exposed.

2b_cold_key 4 / 20

Same.

2c_sig_long_term 6 / 20

Tx-once for accounts; validator keys persistent.

2d_encryption_conf 6 / 20

SGX seal keys protect private contract state. SGX attestation ECDSA break forges attestations → possibly unseal.

3 Metadata & Privacy Exposure 40 / 100
3a_graph_visibility 14 / 20

Privacy is smart-contract-level (TEE-sealed state). Tx graph at consensus layer is partially visible (sender/gas) but payload is encrypted via SGX.

3b_rpc_concentration 10 / 20

Figment, Keplr-hosted RPC.

3c_bridge_correlation 8 / 20

IBC bridges leak metadata.

3d_retroactive_deanon 8 / 20

Privacy is TEE-based (SGX), not crypto-based — different quantum profile. Shor break of SGX attestation ECDSA could enable attestation forgery but does not directly decrypt sealed state. Sealed state depends on SGX seal keys (AES-like), only Grover-weakened. Better retroactive posture than zk-SNARK privacy chains.

4 Migration Architecture 25 / 100
4a_crypto_agility 6 / 20

Cosmos SDK module-based. PQC signature module addable via module upgrade.

4b_aa_key_rotation 5 / 20

Standard Cosmos accounts.

4c_hard_fork_track_record 10 / 20

Multiple upgrades. CometBFT coordination.

4d_hybrid_deployment_readiness 4 / 20

Not architected.

5 Deployment Execution 0 / 100
5a_mainnet_pqc_pct 0 / 20
5b_pqc_code_in_consensus 0 / 20
5c_validator_pqc_keys 0 / 20
5d_published_milestones 0 / 20

DoraFactory cosmos-pqc is external reference; Secret has no own milestones.

5e_pqc_washing_delta 0 / 20
6 Supply Chain Vendor Readiness 5 / 100
6a_wallet 2 / 20
6b_bridge 1 / 20
6c_custodian 1 / 20
6d_rpc_hsm 1 / 20
7 Governance & Coordination 35 / 100
7a_validator_stake_distribution 7 / 20

80 validators.

7b_upgrade_cadence_under_pressure 10 / 20

Multiple upgrades, SecretAI/SecretVM pivots.

7c_named_coordination_lead 10 / 20

SCRT Labs.

7d_adversarial_coordination_precedent 8 / 20

Multiple SGX vulnerability responses.

The X + Y vs Z inequality

X (data shelf life): 10-15 (sealed contract state long-lived)

Y (migration time): 10-15

Z10 (10% CRQC year): 2036 · Z50 (50%): 2041

Verdict: X+Y > Z (danger).

Four-scenario grid

ScenarioValue preservedPrivacy preserved
quantum never 100% 100%
arrives suddenly pre migration 5% 45%
arrives slowly post migration 75% 65%
arrives slowly mid migration 30% 45%

Peers in the privacy-L2 profile

Order-book view of the 5 chains closest to Secret Network by QRI.

Public artifacts used for this scorecard

Each entry below is a sub-score citation. Clicking the link takes you to the public source. A third party should be able to reconstruct every number on this page from these URLs in 48 hours.

Cryptographic Exposure · 1a_primitive_inventory
Cryptographic Exposure · 1e_implementation_quality

Supply chain snapshot

wallet Keplr · Leap Wallet · Fina 0 PQC roadmaps
bridge IBC · Axelar 0 PQC roadmaps
custodian Coinbase Custody · BitGo 0 PQC roadmaps
rpc_hsm Figment · Ankr 0 PQC roadmaps

A chain's supply chain cannot migrate faster than its slowest dependency. Zero PQC roadmaps in any of the four categories is a structural blocker, not a lagging indicator.

Analyst notes on the scoring

TEE-privacy retroactive-deanon profile markedly better than zk-privacy: sealed state survives Shor. Privacy_preserved_pct=45% in sudden-pre-migration (vs 0% for Penumbra) reflects SGX seal key survivability. SGX hardware faults (classical) are bigger near-term risk.

Scorecard metadata

  • Profile: privacy-L2
  • Scored: 2026-04-18 by layerqu-v2-scoring-agent-4
  • v1 reference: chainscreen-v1-archive
  • QRI raw: 14 · after caps: 12
  • Confidence interval: ±15
  • PQC washing ratio: 1x
  • Burn-vs-rescue: undeclared

Caps triggered

  • Mosca (5a<20%)
  • Sutor (5d=0)
  • Preskill (<3 artifacts several dims → ×0.5)
  • Casado
  • Hybrid gate FAIL → QRI cap 60
LayerQu · Secret Network scorecard v2 · reconstructs from public evidence
Methodology · Desk · API