{
  "chain_slug": "oasis",
  "name": "Oasis Network",
  "scorecard_profile": "privacy-L2",
  "evaluated_at": "2026-04-18",
  "evaluator": "layerqu-v2-scoring-agent-4",
  "v1_reference": "chainscreen-v1-archive",
  "dimensions": {
    "1_cryptographic_exposure": {
      "weight": 0.12,
      "score": 30,
      "sub_scores": {
        "1a_primitive_inventory": {
          "score": 12,
          "primitives_named": [
            "Ed25519 (consensus + tx)",
            "SHA-512",
            "Intel SGX attestation (ParaTime TEE)"
          ],
          "evidence": [
            "Oasis docs"
          ],
          "note": "TEE-based privacy is non-crypto — SGX attestation uses RSA/ECDSA."
        },
        "1b_shor_grover_pq_tag": {
          "score": 12,
          "tags": {
            "Ed25519": "Shor-break",
            "SHA-512": "Grover-weaken",
            "SGX attestation (ECDSA)": "Shor-break"
          }
        },
        "1c_algorithm_family_diversity": {
          "score": 0,
          "families_represented": 0,
          "families": []
        },
        "1d_nist_security_category": {
          "score": 0,
          "mappings": {}
        },
        "1e_implementation_quality": {
          "score": 6,
          "formal_verification": "partial (TEE Oasis research)",
          "constant_time": "standard",
          "libraries": [
            "oasis-core"
          ],
          "evidence": [
            "https://github.com/oasisprotocol/oasis-core"
          ]
        }
      },
      "total_artifacts": 1
    },
    "2_hndl_exposure": {
      "weight": 0.1,
      "score": 20,
      "sub_scores": {
        "2a_active_key": {
          "score": 3,
          "note": "Ed25519 pubkey exposed."
        },
        "2b_cold_key": {
          "score": 3,
          "note": "Same."
        },
        "2c_sig_long_term": {
          "score": 7,
          "note": "Tx-once."
        },
        "2d_encryption_conf": {
          "score": 7,
          "note": "SGX-based confidential compute — if SGX cracked OR underlying attestation ECDSA broken, historical sealed data is at risk."
        }
      },
      "total_artifacts": 1
    },
    "3_metadata_privacy_exposure": {
      "weight": 0.25,
      "score": 45,
      "sub_scores": {
        "3a_graph_visibility": {
          "score": 15,
          "note": "Sapphire confidential EVM conceals tx-level state but not tx graph at consensus layer. Metadata (sender/receiver/amount) visible depending on Sapphire vs Cipher ParaTime."
        },
        "3b_rpc_concentration": {
          "score": 10,
          "note": "Oasis Foundation-operated RPC heavy."
        },
        "3c_bridge_correlation": {
          "score": 10,
          "note": "Bridges to Ethereum; correlation possible at bridge endpoints."
        },
        "3d_retroactive_deanon": {
          "score": 10,
          "note": "TEE privacy is different profile — confidentiality rests on SGX seal keys + attestation. If ECDSA attestation breaks, historical attestations forgeable; sealed state potentially reconstructable. Lower than pure-crypto privacy but non-trivial."
        }
      },
      "total_artifacts": 2
    },
    "4_migration_architecture": {
      "weight": 0.12,
      "score": 25,
      "sub_scores": {
        "4a_crypto_agility": {
          "score": 5,
          "note": "ParaTime modular but core Ed25519 fixed."
        },
        "4b_aa_key_rotation": {
          "score": 7,
          "note": "Standard Cosmos/Oasis keys."
        },
        "4c_hard_fork_track_record": {
          "score": 8,
          "note": "Multiple upgrades since 2020."
        },
        "4d_hybrid_deployment_readiness": {
          "score": 5,
          "note": "ParaTime could host PQC ParaTime in theory."
        }
      },
      "total_artifacts": 1
    },
    "5_deployment_execution": {
      "weight": 0.18,
      "score": 0,
      "sub_scores": {
        "5a_mainnet_pqc_pct": {
          "score": 0,
          "mainnet_pqc_pct": 0,
          "evidence": []
        },
        "5b_pqc_code_in_consensus": {
          "score": 0,
          "loc_or_bytes": 0
        },
        "5c_validator_pqc_keys": {
          "score": 0,
          "pct": 0
        },
        "5d_published_milestones": {
          "score": 0,
          "count": 0,
          "milestones": []
        },
        "5e_pqc_washing_delta": {
          "score": 0,
          "ratio": 1
        }
      },
      "total_artifacts": 0
    },
    "6_supply_chain_vendor_readiness": {
      "weight": 0.18,
      "score": 5,
      "sub_scores": {
        "6a_wallet": {
          "score": 2,
          "top3": [
            "Oasis Wallet",
            "MetaMask (Sapphire)",
            "Keplr"
          ],
          "pqc_roadmap_count": 0
        },
        "6b_bridge": {
          "score": 1,
          "top3": [
            "Oasis Bridge",
            "Wormhole",
            "Celer"
          ],
          "pqc_roadmap_count": 0
        },
        "6c_custodian": {
          "score": 1,
          "top3": [
            "Coinbase Custody",
            "BitGo",
            "Fireblocks"
          ],
          "pqc_roadmap_count": 0
        },
        "6d_rpc_hsm": {
          "score": 1,
          "top3": [
            "Oasis RPC",
            "Figment",
            "Ankr"
          ],
          "pqc_roadmap_count": 0
        }
      },
      "total_artifacts": 1
    },
    "7_governance_coordination": {
      "weight": 0.05,
      "score": 30,
      "sub_scores": {
        "7a_validator_stake_distribution": {
          "score": 5,
          "note": "~120 validators."
        },
        "7b_upgrade_cadence_under_pressure": {
          "score": 8,
          "note": "Sapphire, ROFL AI rollouts."
        },
        "7c_named_coordination_lead": {
          "score": 10,
          "note": "Oasis Foundation (UC Berkeley founders)."
        },
        "7d_adversarial_coordination_precedent": {
          "score": 7,
          "note": "No PQC or SGX-break precedent."
        }
      },
      "total_artifacts": 1
    }
  },
  "gates": {
    "hybrid_deployment": "FAIL",
    "evidence_reconstruction": "PASS",
    "primitive_naming": "PASS"
  },
  "caps_applied": [
    "Mosca (5a<20%)",
    "Sutor (5d=0)",
    "Preskill (<3 artifacts several dims)",
    "Casado",
    "Hybrid gate FAIL → QRI cap 60"
  ],
  "qri": {
    "raw": 15,
    "after_caps": 13,
    "ci_plus_minus": 15,
    "band": 2,
    "band_name": "Acknowledged"
  },
  "migration_stage": 0,
  "mosca_inequality": {
    "X_signature_shelf_life_years": "10-20 (confidential state shelf-life infinite if SGX sealed)",
    "Y_migration_time_years_range": "10-15",
    "Z_10pct_year": 2036,
    "Z_50pct_year": 2041,
    "danger_zone_at_50pct": true
  },
  "four_scenario_grid": {
    "quantum_never": {
      "value_preserved_pct": 100,
      "privacy_preserved_pct": 100
    },
    "arrives_suddenly_pre_migration": {
      "value_preserved_pct": 5,
      "privacy_preserved_pct": 20
    },
    "arrives_slowly_post_migration": {
      "value_preserved_pct": 78,
      "privacy_preserved_pct": 55
    },
    "arrives_slowly_mid_migration": {
      "value_preserved_pct": 30,
      "privacy_preserved_pct": 30
    }
  },
  "burn_vs_rescue_policy": "undeclared",
  "pqc_washing_ratio": 1,
  "vendor_tile_summary": {
    "wallet": {
      "top3": [
        "Oasis Wallet",
        "MetaMask (Sapphire)",
        "Keplr"
      ],
      "pqc_roadmap_count": 0
    },
    "bridge": {
      "top3": [
        "Oasis Bridge",
        "Wormhole",
        "Celer"
      ],
      "pqc_roadmap_count": 0
    },
    "custodian": {
      "top3": [
        "Coinbase Custody",
        "BitGo",
        "Fireblocks"
      ],
      "pqc_roadmap_count": 0
    },
    "rpc_hsm": {
      "top3": [
        "Oasis RPC",
        "Figment",
        "Ankr"
      ],
      "pqc_roadmap_count": 0
    }
  },
  "narrative_summary": "Oasis Network treated as privacy-L2 (TEE-based privacy via Sapphire + ROFL). Band 2 (Acknowledged). Unique exposure profile: privacy rests on Intel SGX attestation (ECDSA) rather than crypto primitives. Quantum break of ECDSA forges attestations, potentially unsealing historical confidential state. Zero PQC work. EU DAC8 (Jan 2026) creates demand but no PQC response.",
  "evaluator_notes": "TEE-privacy retroactive-deanon profile is different from zk-privacy: SGX seal keys themselves are independent of Shor. However, SGX attestation relies on ECDSA/RSA which Shor breaks, allowing forged attestations — less severe than a ring-signature Shor-break but still material. Scored 3d=10/25.",
  "narrative_voiced": "Oasis sells privacy via Intel SGX, not via cryptography. That feels reassuring right up to the moment you notice the attestation itself is ECDSA. Break the attestation, forge the enclave, and the historical sealed state is no longer sealed by anyone you can verify."
}