Overview

Secret Network enables developers to build decentralized applications with encrypted data, both natively on Secret and on other blockchains through cross-chain communication, unlocking powerful new use-cases for Web3. This is known as Decentralized Confidential Computing, or DeCC.

HackSecret 4 is an opportunity to build cutting-edge Web3 applications for the Cosmos, EVM, or Solana, utilizing Secret Network's decentralized confidential computing (DeCC) capabilities. If you are a developer from another ecosystem who has never worked with Secret contracts before, have no fear! Our developer toolkits will teach you everything you need to know to get started and win prizes.

Confidential computing unlocks exciting new use-cases, and Secret Network's Confidential Computing Layer enables developers to do this while building on nearly any blockchain! This hackathon includes two tracks, one for cross-chain applications (IBC, EVM, or Solana), and one for native Secret applications. The choice is yours!

If you have questions, you can contact the Secret Network team, or join the Secret Network Developer Telegram or Discord. Also, be sure to check out our HackSecret 4 event schedule, which includes workshops and open discussion sessions.

Schedule

All workshops will take place on Secret Network's Discord:

Tracks

Cross-Chain dApps For dApps built on other blockchains that utilize Secret Network's Confidential Computing Layer. Cross-chain communication can be achieved via SecretPath, Axelar GMP, or IBC.

  • Example: A dApp that stores encrypted data on Polygon or Solana and decrypts with Secret smart contracts (see developer resources below for examples).

Cross-Chain dApps - Sei Bounty (Up to $5,000 in SEI) Build a dApp on Sei that utilizes Secret's Confidential Computing Layer. For SEI developer resources, see the "Developer Resources" section below.

Native Secret dApps For dApps built natively on Secret Network. Secret's privacy-by-default design is essential to the security and adoption of the decentralized web. User-side privacy not only enables novel use cases but also puts users back in charge of their sensitive data.

  • Example: a messaging dApp built exclusively using Secret smart contracts

Prize Distribution

Total Pool Value: $12,000 USD

  • 35,000 SCRT
  • $5,000 in SEI

Secret Network and its affiliates reserve the right to withhold prizes at their discretion if submissions do not meet the competition's standards.

Requirements for Submission

You should submit your BUIDL via DoraHacks.io.

Submission Expectation:

  • Documentation: Provide clear and concise documentation of your projects. This should include setup instructions, usage guidelines, and any additional information that helps judges and other developers understand the project.
  • Demo or Video: Create a demo or video showcasing your project's functionality. Videos are particularly helpful in conveying the project's value and can be easily shared and understood by judges and the public. Preferably contracts have a usable UI/Mockup to be shown.
  • Open Source: Make projects open source. This fosters collaboration, allows others to learn from your code, and contributes to the broader developer community. The full code of your back and frontend should be submitted under a (restrictive/permissive) open source license.
  • Written Description: Include a README.md in your github repository (max 2 pages) that includes a "User focused summary" (talk about what it does), an "Investor pitch" (What is the problem it solves and where is the product market fit?), and a "Development Deepdive" (How did you build this, how do the contracts/functions interact and which design choices did you make).

NOTE: The jury will compile the codebase and only judge protocols that properly compile with the listed dependencies, this also accounts for UIs or other product deliverables. Adding Tests to your codebase is preferred.

Judging Criteria & Selection Process

Initial Review:

  • Upon the submission deadline, the organizing committee will conduct an initial review of all project submissions to ensure they meet the specified entry requirements and guidelines. Submissions failing to meet the criteria will be disqualified from further evaluation. Technical Evaluation:

  • Qualified submissions will undergo a thorough technical evaluation by a panel of judges with expertise in Secret Network, confidential computation, decentralized computing, and software development. Judges will assess the technical complexity, innovation, and feasibility of each project. Judges will consider the project's ability to address real-world challenges, its potential for adoption and scalability, and the value it brings to the Secret Network community and decentralized confidential computing ecosystem.

Presentation and Q&A Session:

  • Finalists will be invited to present their projects to the judging panel during a live virtual event. Teams will have the opportunity to showcase their work, discuss their technical approach, and answer questions from the judges. Presentations will be evaluated based on clarity, coherence, and the team's ability to effectively communicate their project's key features, functionalities, and impact.

Selection of Winners:

  • Winners will be announced after the finalist demos, and prizes will be awarded to the top-performing teams.
  • There are no KYC or contract requirements for prize withdrawal. Developers from all countries are eligible for participation.

Developer Resources

#Example Project Ideas:

  • ZK-secret:
    An app that allows selective information revelation about your on-chain activity through query permits to a contract.
    Example: "I own 2 anons, I never bridged to Noble," etc.

  • Secret-event Passes:
    An app where an evolving NFT (much like Mystic Skulls) reveals new information based on GPS coordinates the owner visits.

  • Vote Bribery for Cosmos:
    An app where people can privately spend money to influence delegates on other Cosmos chains to vote as the briber desires.

  • Private Voting on Cosmos:
    Pool votes from other Cosmos chains on Secret so people can execute their vote privately using weighted votes.

  • Sealed-bid Auctions for NFTs:
    A new bidding mechanism for NFTs on Stargaze/Blur in line with BidShops gamification ideas.

  • Showcase for SNIP52 Push Notifications:
    Showcase SNIP52 push notifications (https://github.com/SolarRepublic/SNIPs/blob/feat/snip-52/SNIP-52.md) with an on-chain game.

  • Build Out an NFP:
    Build a Non Fungible Program. Based on the paper at Chain Science: https://arxiv.org/abs/2404.15632. Possible ideas: DeFi, messaging, a dead-drop mail service, or a permissionless Tor browser all non fungible programs.

  • Explore Confidential NFTs with RWAs Find use cases of Secret's native Confidential NFTs or the CCL Toolkit for EVM and Solana to explore use cases for Real World Assets (RWAs)

  • DeFi dApps
    Fork off the SecretSwap repos (https://github.com/scrtlabs/SecretSwap) to create new and interesting AMM curves. Consider projects with other AMM curves and bring them to Secret.

For questions, contact the Secret Network team, or join the Secret Network Telegram or Discord.