{"version":1,"pages":[{"id":"5yi1lXW892fl6lVgt129","title":"Secret Network Introduction","pathname":"/secret-network-documentation","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"}]},{"id":"MlVMCoGXBRrhSVaTg3Wo","title":"Secret Network Techstack","pathname":"/secret-network-documentation/introduction/secret-network-techstack","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"}]},{"id":"RvXTfoMZPGeYDQFlHcF5","title":"Private transactions - A quick summary","pathname":"/secret-network-documentation/introduction/secret-network-techstack/consensus-for-secret-transactions","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"}]},{"id":"N9IxT8iEEAJKmRCixVJu","title":"Blockchain Technology","pathname":"/secret-network-documentation/introduction/secret-network-techstack/blockchain-technology","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"}]},{"id":"zspqTVJiAB0GLhdIe7Yx","title":"Cosmos Basics","pathname":"/secret-network-documentation/introduction/secret-network-techstack/blockchain-technology/cosmos-basics","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Blockchain Technology"}]},{"id":"935aBNG9WaNLnuOxv15l","title":"Tendermint","pathname":"/secret-network-documentation/introduction/secret-network-techstack/blockchain-technology/tendermint","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Blockchain Technology"}]},{"id":"9GfY5S0suUp9OJZZtDFM","title":"Cosmos SDK","pathname":"/secret-network-documentation/introduction/secret-network-techstack/blockchain-technology/cosmos-sdk","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Blockchain Technology"}]},{"id":"4KC9IC6VKJfs3r0oh0T7","title":"IBC","pathname":"/secret-network-documentation/introduction/secret-network-techstack/blockchain-technology/ibc","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Blockchain Technology"}]},{"id":"Fn4w93znN70W14xImgcW","title":"CosmWasm","pathname":"/secret-network-documentation/introduction/secret-network-techstack/blockchain-technology/cosmwasm","siteSpaceId":"sitesp_pEM6o","description":"An introduction to CosmWasm","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Blockchain Technology"}]},{"id":"q1XYctIBMqU0GZamhT9F","title":"Privacy Technology","pathname":"/secret-network-documentation/introduction/secret-network-techstack/privacy-technology","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"}]},{"id":"VIBKJtiUCmcpgERnz8ZJ","title":"Encryption - Key Management","pathname":"/secret-network-documentation/introduction/secret-network-techstack/privacy-technology/encryption-key-management","siteSpaceId":"sitesp_pEM6o","description":"An extensive discussion of Secret Network's cryptography","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Privacy Technology"}]},{"id":"UZJ1LgYZjxaiutUpBijb","title":"Overview","pathname":"/secret-network-documentation/introduction/secret-network-techstack/privacy-technology/encryption-key-management/overview","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Privacy Technology"},{"label":"Encryption - Key Management"}]},{"id":"PHdlsJndxMr9GQZOF07y","title":"Key Derivation & Encryption Techniques","pathname":"/secret-network-documentation/introduction/secret-network-techstack/privacy-technology/encryption-key-management/key-derivation-and-encryption-techniques","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Privacy Technology"},{"label":"Encryption - Key Management"}]},{"id":"qQ1ygfSL9XUPc4wckk1W","title":"The Initialization Of Secret Network","pathname":"/secret-network-documentation/introduction/secret-network-techstack/privacy-technology/encryption-key-management/bootstrap-process","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Privacy Technology"},{"label":"Encryption - Key Management"}]},{"id":"74VTpLjIUErUqRzWfBam","title":"Full Node Boostrap","pathname":"/secret-network-documentation/introduction/secret-network-techstack/privacy-technology/encryption-key-management/full-node-boostrap","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Privacy Technology"},{"label":"Encryption - Key Management"}]},{"id":"KpVstXPJdP3v11ZZsknQ","title":"Contract State Encryption","pathname":"/secret-network-documentation/introduction/secret-network-techstack/privacy-technology/encryption-key-management/contract-state-encryption","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Privacy Technology"},{"label":"Encryption - Key Management"}]},{"id":"zc9FVhcHL43UEPQqnLfx","title":"Transaction Encryption","pathname":"/secret-network-documentation/introduction/secret-network-techstack/privacy-technology/encryption-key-management/transaction-encryption","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Privacy Technology"},{"label":"Encryption - Key Management"}]},{"id":"VUk0hrHijhv8aJ0HKYgo","title":"Consensus seed rotation","pathname":"/secret-network-documentation/introduction/secret-network-techstack/privacy-technology/encryption-key-management/consensus-seed-rotation","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Privacy Technology"},{"label":"Encryption - Key Management"}]},{"id":"PdTvpxcdWsWZCLmFy1cC","title":"Trusted Execution Environments  (TEE) —  Intel SGX","pathname":"/secret-network-documentation/introduction/secret-network-techstack/privacy-technology/intel-sgx","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Privacy Technology"}]},{"id":"fw0XFULzKZrBEVcBsQp1","title":"How Secret Network Uses SGX","pathname":"/secret-network-documentation/introduction/secret-network-techstack/privacy-technology/intel-sgx/overview","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Privacy Technology"},{"label":"Trusted Execution Environments  (TEE) —  Intel SGX"}]},{"id":"W3wuLamKftRmTUjkGLVd","title":"SGX-SPS Security & Reliabillity","pathname":"/secret-network-documentation/introduction/secret-network-techstack/privacy-technology/intel-sgx/why-sgx","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Privacy Technology"},{"label":"Trusted Execution Environments  (TEE) —  Intel SGX"}]},{"id":"5XuWiaXr4sDYosORlg76","title":"Remote Attestation","pathname":"/secret-network-documentation/introduction/secret-network-techstack/privacy-technology/intel-sgx/remote-attestation","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Privacy Technology"},{"label":"Trusted Execution Environments  (TEE) —  Intel SGX"}]},{"id":"inaOL8qzCn8sqsF4zVtw","title":"Trusted & Untrusted Core","pathname":"/secret-network-documentation/introduction/secret-network-techstack/privacy-technology/intel-sgx/trusted-core","siteSpaceId":"sitesp_pEM6o","description":"More info coming soon","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Privacy Technology"},{"label":"Trusted Execution Environments  (TEE) —  Intel SGX"}]},{"id":"3UkeZWeHCzveRs18V3Yl","title":"Sealing","pathname":"/secret-network-documentation/introduction/secret-network-techstack/privacy-technology/intel-sgx/sealing","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Privacy Technology"},{"label":"Trusted Execution Environments  (TEE) —  Intel SGX"}]},{"id":"JKzo5K7adIepfJp3GuNt","title":"Private smart contracts - overview","pathname":"/secret-network-documentation/introduction/secret-network-techstack/privacy-technology/private-computation-and-consensus-flow","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"INTRODUCTION","emoji":"1f44b"},{"label":"Secret Network Techstack"},{"label":"Privacy Technology"}]},{"id":"zMux2xH6iFV2ZLnlWLso","title":"Getting Started","pathname":"/secret-network-documentation/development/readme-1","siteSpaceId":"sitesp_pEM6o","emoji":"1f3e0","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"}]},{"id":"bXbczqjZCk4urspu9gSs","title":"Setting Up Your Environment","pathname":"/secret-network-documentation/development/readme-1/setting-up-your-environment","siteSpaceId":"sitesp_pEM6o","description":"Environment configuration instructions to get started developing on Secret Network.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Getting Started","emoji":"1f3e0"}]},{"id":"18n0u9cl1YEMiyumPACT","title":"Cargo.toml Best Practices (Crates vs Dependencies)","pathname":"/secret-network-documentation/development/readme-1/setting-up-your-environment/cargo.toml-best-practices-crates-vs-dependencies","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Getting Started","emoji":"1f3e0"},{"label":"Setting Up Your Environment"}]},{"id":"25RABjmCRCBtAKJY4Xz8","title":"Compile and Deploy","pathname":"/secret-network-documentation/development/readme-1/compile-and-deploy","siteSpaceId":"sitesp_pEM6o","description":"In this example, we will compile, upload, and instantiate our first smart contract using SecretCLI and Secret Testnet.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Getting Started","emoji":"1f3e0"}]},{"id":"FVChrdT7Uf6tFG1bjnDN","title":"Running the Application","pathname":"/secret-network-documentation/development/readme-1/running-the-application","siteSpaceId":"sitesp_pEM6o","description":"Learn how to use SecretCLI to handle messages to query and modify contract state.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Getting Started","emoji":"1f3e0"}]},{"id":"1Bv61obJFAWEzhtoBW0B","title":"Compile and Deploy on Secret testnet (best for Javascript devs)","pathname":"/secret-network-documentation/development/readme-1/interacting-with-the-testnet","siteSpaceId":"sitesp_pEM6o","description":"Get started developing on Secret Network using the public testnet and secret.js","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Getting Started","emoji":"1f3e0"}]},{"id":"oWpPydxCB8nwRKJ5QA2s","title":"Fullstack dApp Integration","pathname":"/secret-network-documentation/development/readme-1/fullstack-dapp-integration","siteSpaceId":"sitesp_pEM6o","description":"Learn how to write a full stack decentralized React application utilizing a Secret smart contract and Secret.js","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Getting Started","emoji":"1f3e0"}]},{"id":"2PrAQlOQSqQVyaEQ1ggA","title":"Secret Contracts","pathname":"/secret-network-documentation/development/development-concepts","siteSpaceId":"sitesp_pEM6o","emoji":"1f913","description":"Additional development concepts to improve your experience building on Secret Network.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"}]},{"id":"kyupFOqH5jkFVdj8ia1P","title":"Secret Contracts & CosmWasm","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-cosmwasm-framework","siteSpaceId":"sitesp_pEM6o","description":"A description of CosmWasm and the framework around it as implemented on Secret Network","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"}]},{"id":"KYe4yhIfhC4kxl0jF5U3","title":"Framework overview","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-cosmwasm-framework/framework-overview","siteSpaceId":"sitesp_pEM6o","description":"A description of CosmWasm and the framework around it as implemented on Secret Network","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret Contracts & CosmWasm"}]},{"id":"mmgAuDurMFC3k0zgG1sb","title":"Secret Contract Components","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-cosmwasm-framework/contract-components","siteSpaceId":"sitesp_pEM6o","description":"This overview examines the core components of Secret Network smart contracts","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret Contracts & CosmWasm"}]},{"id":"Ke555xNskz60c0wRtgUn","title":"Instantiation Message","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-cosmwasm-framework/contract-components/init","siteSpaceId":"sitesp_pEM6o","description":"An explainer of the Instantiate file inside of the CosmWasm code framework","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret Contracts & CosmWasm"},{"label":"Secret Contract Components"}]},{"id":"sRR30jKckGfNw0zy2F5J","title":"Execution Message","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-cosmwasm-framework/contract-components/handles","siteSpaceId":"sitesp_pEM6o","description":"An explainer of the Execute file inside of the CosmWasm code framework","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret Contracts & CosmWasm"},{"label":"Secret Contract Components"}]},{"id":"XDb7HlAnEVVh3tVdH82Y","title":"Query Message","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-cosmwasm-framework/contract-components/queries","siteSpaceId":"sitesp_pEM6o","description":"An explainer of the query file inside of the CosmWasm code framework","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret Contracts & CosmWasm"},{"label":"Secret Contract Components"}]},{"id":"ZMnKcDQZDo1pzRnZomW9","title":"Deps/DepsMut","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-cosmwasm-framework/contract-components/deps-depsmut","siteSpaceId":"sitesp_pEM6o","description":"An explainer of the dependecies inside of the CosmWasm code framework","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret Contracts & CosmWasm"},{"label":"Secret Contract Components"}]},{"id":"uQaNEm3JOcsdvawEZQpu","title":"Storage","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-cosmwasm-framework/contract-components/storage","siteSpaceId":"sitesp_pEM6o","description":"An explainer on the varying storage frameworks for Secret contracts","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret Contracts & CosmWasm"},{"label":"Secret Contract Components"}]},{"id":"LC0Hejvq3Dmth1F9nCqO","title":"Prefixed Storage","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-cosmwasm-framework/contract-components/storage/prefixed-storage","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret Contracts & CosmWasm"},{"label":"Secret Contract Components"},{"label":"Storage"}]},{"id":"d5lOFrEePXy8kSdnLrLS","title":"Singleton","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-cosmwasm-framework/contract-components/storage/singleton","siteSpaceId":"sitesp_pEM6o","description":"Working with a Singleton in CosmWasm","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret Contracts & CosmWasm"},{"label":"Secret Contract Components"},{"label":"Storage"}]},{"id":"e22imBBIeLo6MDUNKWvr","title":"Keymap","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-cosmwasm-framework/contract-components/storage/keymap","siteSpaceId":"sitesp_pEM6o","description":"This hashmap-like storage structure uses generic typed keys to store objects.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret Contracts & CosmWasm"},{"label":"Secret Contract Components"},{"label":"Storage"}]},{"id":"W6uctaKTiHjuxkGyhCm7","title":"Append Store","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-cosmwasm-framework/contract-components/storage/append-store","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret Contracts & CosmWasm"},{"label":"Secret Contract Components"},{"label":"Storage"}]},{"id":"kgEYUSCfnRC5G1iIhZBF","title":"Best practices","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-cosmwasm-framework/contract-components/storage/contract-optimization","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret Contracts & CosmWasm"},{"label":"Secret Contract Components"},{"label":"Storage"}]},{"id":"XqFoUCRzz8OKoU26NVr4","title":"CosmWasm vs Secret CosmWasm","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-cosmwasm-framework/differences-from-vanilla-cw","siteSpaceId":"sitesp_pEM6o","description":"An introduction to the differences between standard CosmWasm smart contracts and Secret Contracts","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret Contracts & CosmWasm"}]},{"id":"qibk4OXjlMytUY6MCdll","title":"Secret Tokens (SNIP-20)","pathname":"/secret-network-documentation/development/development-concepts/create-your-own-snip-20-token-on-secret-network","siteSpaceId":"sitesp_pEM6o","description":"Learn how to create a SNIP-20 token on Secret Network","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"}]},{"id":"Q0UudxDmv8R3DMCr5sui","title":"Contract - module call","pathname":"/secret-network-documentation/development/development-concepts/how-to-send-native-scrt","siteSpaceId":"sitesp_pEM6o","description":"Explanation of executing modules inside a CosmWasm contract using sending Native SCRT as an example.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"}]},{"id":"nNG6bCTZFXeb7HUmEdZE","title":"Secret contract - Design Space/Features","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals","siteSpaceId":"sitesp_pEM6o","description":"A high-level overview of Secret smart contracts","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"}]},{"id":"maZhT3OABUzTRO3TxUfV","title":"Secret Contracts introduction","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/secret-contracts-introduction","siteSpaceId":"sitesp_pEM6o","description":"This page describes some of the core information required to get up to speed about the state of Secret Contracts in comparison to public (cosmos) networks.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"rZ1rdCW2YWp5otr2qDH3","title":"Gas/Fee usage","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/gas-fee-usage","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"0gJCi18bUy1yZmel8hL0","title":"TPS and scalability","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/tps-and-scalability","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"ozYU8Zi6X59VmxVeyWCZ","title":"Privacy Essentials","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/privacy-essentials","siteSpaceId":"sitesp_pEM6o","description":"Your start on privacy design for Secret smart contracts","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"YXSkR6WAW1U2kAPFZrJ3","title":"Access Control","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/access-control","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"XeUghJECPcaUGTetvLmS","title":"Viewing Keys","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/access-control/viewing-keys","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"},{"label":"Access Control"}]},{"id":"7duzPQpejw8K1opFKIUS","title":"Permits","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/access-control/permits","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"},{"label":"Access Control"}]},{"id":"3s603jvcGbvgYC4UkcYJ","title":"Trusted and untrusted data","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/secret-contracts","siteSpaceId":"sitesp_pEM6o","description":"This page explains the concept of input data verification, a required mechanism to ensure reliable privacy for secret contracts.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"rxQ41ux9pwCBUeymavrB","title":"Secret-VRF - on-chain Randomness","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/secret-vrf-on-chain-randomness","siteSpaceId":"sitesp_pEM6o","description":"An in-depth explanation of Secret VRF, a secure and verifiable random number generator","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"i7ejjJNazI66tQdfjyDv","title":"Privacy design","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/privacy-design","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"NFrmzA8ccWqRTugayFbN","title":"Mitigate privacy risks - full guide","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/privacy-design/mitigate-privacy-risks-full-guide","siteSpaceId":"sitesp_pEM6o","description":"Full example guide on mitigating privacy risks.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"},{"label":"Privacy design"}]},{"id":"Ty7F4HPappcVVFOHy7tV","title":"Gas Evaporation & Tracking","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/privacy-design/gas-evaporation-and-tracking","siteSpaceId":"sitesp_pEM6o","description":"The equivalent of padding for gas_used","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"},{"label":"Privacy design"}]},{"id":"oSbiSUPWC4nShXoTaZKr","title":"Confidential Computing Layer","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/privacy-as-a-service-paas","siteSpaceId":"sitesp_pEM6o","description":"A technical deep-dive into how Secret can provide confidential computation to dApps on other blockchains by leveraging cross-chain communication and Secret contracts.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"awJCvdtkqoGtpEUnSC4S","title":"Fiat/Crypto Onboarding","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/fiat-crypto-onboarding","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"hXvVm9QHVJgofTPMvEwv","title":"Account abstraction","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/account-abstraction","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"Ie1t0AjvgbxH1wJgBIPY","title":"Fee abstraction","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/fee-abstraction","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"21Uwzg9yVJJ6vtOdy2K9","title":"Wallet support","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/wallet-support","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"EBq32eAgfQPkqzHM4b74","title":"Bridge (messaging/tokens)","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/bridge-messaging-tokens","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"EQXEHnXjiEpCy7ScapoH","title":"IBC (Hooks, PFM, Wasm)","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/ibc-hooks-pfm-wasm","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"oe1vwlIniaP2BKJC5jd4","title":"Price Oracles","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/price-oracles","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"J6n9NNqzkibiJ7Epb3ds","title":"Auto Restaking","pathname":"/secret-network-documentation/development/development-concepts/secret-contract-fundamentals/auto-restaking","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Secret contract - Design Space/Features"}]},{"id":"QrssteTgWDwnOOEpGCKz","title":"Permissioned Viewing","pathname":"/secret-network-documentation/development/development-concepts/permissioned-viewing","siteSpaceId":"sitesp_pEM6o","description":"Deciding who can and can't see your private data, and how to do it.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"}]},{"id":"iyc6228boixKDdKCDcFt","title":"Viewing Keys","pathname":"/secret-network-documentation/development/development-concepts/permissioned-viewing/viewing-keys","siteSpaceId":"sitesp_pEM6o","description":"Introduction to Secret Network viewing keys with code examples","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Permissioned Viewing"}]},{"id":"scZijZCuzwsUG8Qb9G6Q","title":"Permits","pathname":"/secret-network-documentation/development/development-concepts/permissioned-viewing/certs-viewing-permits","siteSpaceId":"sitesp_pEM6o","description":"Permits are the successor to viewing keys. With increases in efficiency made in the Shockwave update they are now the defacto viewing permission method in almost every situation.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Permissioned Viewing"}]},{"id":"vPgmJ5gjgz88odOMHmT2","title":"Cross Contract Communication","pathname":"/secret-network-documentation/development/development-concepts/cross-contract-communication","siteSpaceId":"sitesp_pEM6o","description":"Step-by-step guide on how to execute Secret Network smart contracts that communicate with each other","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"}]},{"id":"bB7jwqkzgam4s14ivR3z","title":"Submessages","pathname":"/secret-network-documentation/development/development-concepts/submessages","siteSpaceId":"sitesp_pEM6o","description":"Learn how to use submessages on Secret Network","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"}]},{"id":"NxoC46hJSHnS8Zjuadt1","title":"get_contract_code_hash","pathname":"/secret-network-documentation/development/development-concepts/submessages/get_contract_code_hash","siteSpaceId":"sitesp_pEM6o","description":"get_contract_code_hash helper function","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Submessages"}]},{"id":"KAz2eua4MVCV37Y9ug09","title":"Randomness API - Secret VRF","pathname":"/secret-network-documentation/development/development-concepts/randomness-api","siteSpaceId":"sitesp_pEM6o","description":"An introduction to Secret VRF, a secure and verifiable random number generator","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"}]},{"id":"qSAMczcSfbrI6NrEdn8M","title":"Native On-chain randomness","pathname":"/secret-network-documentation/development/development-concepts/randomness-api/native-on-chain-randomness","siteSpaceId":"sitesp_pEM6o","description":"A step-by-step tutorial of how to use Secret Network's randomness API to generate a coin flip","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Randomness API - Secret VRF"}]},{"id":"ZuWjpJvy7fE85hFxVBQ5","title":"Randomness over IBC","pathname":"/secret-network-documentation/development/development-concepts/randomness-api/randomness-over-ibc","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Randomness API - Secret VRF"}]},{"id":"2MRutKVGbsJzscuyWJAz","title":"Execution Finalization","pathname":"/secret-network-documentation/development/development-concepts/execution-finalization","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"}]},{"id":"wfRKyLy1rGdrSTu6nFEX","title":"Factory Contracts","pathname":"/secret-network-documentation/development/development-concepts/factory-contracts","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"}]},{"id":"ZjSaZ1jemg2bzwzDC01y","title":"Contract Migration","pathname":"/secret-network-documentation/development/development-concepts/contract-migration","siteSpaceId":"sitesp_pEM6o","description":"Optionally perform code and state migrations of Secret Network smart contracts","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"}]},{"id":"Kk4SaM1TocW6CaWuwpJp","title":"Manual - < v1.11","pathname":"/secret-network-documentation/development/development-concepts/contract-migration/manual-less-than-v1.11","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Contract Migration"}]},{"id":"vwkt0rIsNqXdMXEzdjuW","title":"Native - from v1.11","pathname":"/secret-network-documentation/development/development-concepts/contract-migration/native-from-v1.11","siteSpaceId":"sitesp_pEM6o","description":"Optionally perform state migrations of Secret Network smart contracts","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Contract Migration"}]},{"id":"mGOQpXDWxNyXbqJD1HZv","title":"Contract Migration Flow from v1.21","pathname":"/secret-network-documentation/development/development-concepts/contract-migration/contract-migration-flow-from-v1.21","siteSpaceId":"sitesp_pEM6o","description":"Overview","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Contract Migration"}]},{"id":"wW1VM8KMfki7UIlk5v20","title":"Summary of Key Changes","pathname":"/secret-network-documentation/development/development-concepts/contract-migration/contract-migration-flow-from-v1.21/summary-of-key-changes","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Contract Migration"},{"label":"Contract Migration Flow from v1.21"}]},{"id":"Y8duSmxTt3xVvQ0MStwl","title":"Technical Details","pathname":"/secret-network-documentation/development/development-concepts/contract-migration/contract-migration-flow-from-v1.21/technical-details","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Contract Migration"},{"label":"Contract Migration Flow from v1.21"}]},{"id":"j3lJqtQMo8TJtHME7QQQ","title":"Migration Logic","pathname":"/secret-network-documentation/development/development-concepts/contract-migration/contract-migration-flow-from-v1.21/migration-logic","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Contract Migration"},{"label":"Contract Migration Flow from v1.21"}]},{"id":"OYtWXTVbG38mUKdKUKki","title":"CLI Commands","pathname":"/secret-network-documentation/development/development-concepts/contract-migration/contract-migration-flow-from-v1.21/cli-commands","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Contract Migration"},{"label":"Contract Migration Flow from v1.21"}]},{"id":"Yu4i2RjPWDA61dlmO4ET","title":"Migration Guide","pathname":"/secret-network-documentation/development/development-concepts/contract-migration/contract-migration-flow-from-v1.21/migration-guide","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Contract Migration"},{"label":"Contract Migration Flow from v1.21"}]},{"id":"QOuhfZxILxjIJBVev7xj","title":"Usage Examples","pathname":"/secret-network-documentation/development/development-concepts/contract-migration/contract-migration-flow-from-v1.21/usage-examples","siteSpaceId":"sitesp_pEM6o","emoji":"2328","description":"Examples on how to deploy or migrate contracts","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Contract Migration"},{"label":"Contract Migration Flow from v1.21"}]},{"id":"Kx1NLovQjjaZYJI3BLjX","title":"Cross-deploy Vanilla CW and Secret Contracts","pathname":"/secret-network-documentation/development/development-concepts/cross-deploy-vanilla-cw-and-secret-contracts","siteSpaceId":"sitesp_pEM6o","description":"A description of building the same code for both vanilla CosmWasm and the Secret version.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"}]},{"id":"V1xMdgyT8QFgLipZauUa","title":"Testing Secret Contracts","pathname":"/secret-network-documentation/development/development-concepts/testing","siteSpaceId":"sitesp_pEM6o","description":"Introduction to writing tests for Secret Smart Contracts","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"}]},{"id":"moSxRGLpSqsDLsO81lSR","title":"Unit Tests","pathname":"/secret-network-documentation/development/development-concepts/testing/unit-tests","siteSpaceId":"sitesp_pEM6o","description":"How to write Unit Tests for Secret Contracts","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Testing Secret Contracts"}]},{"id":"QuA95TPqtvvfU52zrZzi","title":"Continuous Integration","pathname":"/secret-network-documentation/development/development-concepts/testing/continuous-integration","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Testing Secret Contracts"}]},{"id":"PXCNgs1qG9hMMQbzzeSf","title":"Datatype Handling - Uint, floats etc.","pathname":"/secret-network-documentation/development/development-concepts/testing/data-handling","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contracts","emoji":"1f913"},{"label":"Testing Secret Contracts"}]},{"id":"cLv46AJUJsrpFxOIc9Pr","title":"Secret Contract - Reference, Guides, Examples","pathname":"/secret-network-documentation/development/example-contracts","siteSpaceId":"sitesp_pEM6o","emoji":"1f440","description":"Helpful references for writing Secret Network contracts as well as building full-stack Secret Networks dApps.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"}]},{"id":"CgrftQcp19DgjyKxL96m","title":"Starter guide - Millionaire's Problem","pathname":"/secret-network-documentation/development/example-contracts/millionaires-problem","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"}]},{"id":"ImXL0cvlQERhJ8rTJK86","title":"Reference Contracts","pathname":"/secret-network-documentation/development/example-contracts/community-tutorials","siteSpaceId":"sitesp_pEM6o","description":"This page is dedicated to community tutorials and code repositories that provide helpful references for writing Secret Network contracts as well as building full-stack Secret Networks dApps.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"}]},{"id":"NpqAx1aGEXLXfj9A5N6j","title":"Open source dApps","pathname":"/secret-network-documentation/development/example-contracts/open-source-dapps","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"}]},{"id":"AN4gys0gHb065iDMr7Um","title":"Tools & Libraries","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"}]},{"id":"VMkPyCVjX165PeGQ7iy1","title":"Network interaction SDKs","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/network-interaction-sdks","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"}]},{"id":"gBFqrywBTxTMa2glhKQJ","title":"Secret.js (JavaScript)","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/network-interaction-sdks/secret.js-javascript","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Network interaction SDKs"}]},{"id":"Om0dh0i2IWiBvTLOsxfP","title":"SecretPy (Python)","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/network-interaction-sdks/secretpy","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Network interaction SDKs"}]},{"id":"GeXItadJH6mmP6XttXDz","title":"SecretK (Kotlin)","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/network-interaction-sdks/secretk-kotlin","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Network interaction SDKs"}]},{"id":"srHs7tROyO7hA2fC3k9w","title":"Secret.NET","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/network-interaction-sdks/secret-net","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Network interaction SDKs"}]},{"id":"yTrVMoztmR79z5fQAk1d","title":"Snippets","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/network-interaction-sdks/secret-net/snippets","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Network interaction SDKs"},{"label":"Secret.NET"}]},{"id":"diyufs6nW6gi5HvxVjKG","title":"Deploying a Contract","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/network-interaction-sdks/secret-net/snippets/deploying-a-contract","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Network interaction SDKs"},{"label":"Secret.NET"},{"label":"Snippets"}]},{"id":"X1GtpyePI6WgfEHwX6Z5","title":"Send Native Coin","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/network-interaction-sdks/secret-net/snippets/send-native-coin","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Network interaction SDKs"},{"label":"Secret.NET"},{"label":"Snippets"}]},{"id":"1BifgMpOa5H3i5FcXbCs","title":"Query a Contract","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/network-interaction-sdks/secret-net/snippets/query-a-contract","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Network interaction SDKs"},{"label":"Secret.NET"},{"label":"Snippets"}]},{"id":"QuYduTFKBvkzuPiYAh3m","title":"Create a new Wallet","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/network-interaction-sdks/secret-net/snippets/create-a-new-wallet","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Network interaction SDKs"},{"label":"Secret.NET"},{"label":"Snippets"}]},{"id":"nhtx1zRJjyEC5QpGB7T5","title":"Permits","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/network-interaction-sdks/secret-net/snippets/permits","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Network interaction SDKs"},{"label":"Secret.NET"},{"label":"Snippets"}]},{"id":"mo6c0LAzD1cl5iIyebod","title":"SNIP20","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/network-interaction-sdks/secret-net/snippets/snip20","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Network interaction SDKs"},{"label":"Secret.NET"},{"label":"Snippets"}]},{"id":"Khxy96idBAf15JdUqRVq","title":"SNIP721","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/network-interaction-sdks/secret-net/snippets/snip721","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Network interaction SDKs"},{"label":"Secret.NET"},{"label":"Snippets"}]},{"id":"70YJwmNjI5uzWBTsACFw","title":"Shade.Js","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/network-interaction-sdks/shade.js","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Network interaction SDKs"}]},{"id":"V4KHE851mq59FEv3a80u","title":"LocalSecret - Devnet docker","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/local-secret","siteSpaceId":"sitesp_pEM6o","description":"A local, instant, zero-config Secret Network blockchain.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"}]},{"id":"49lwr8zQtQJPfbOxdvXS","title":"Smart contract - Tools/Utils","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/smart-contract-tools-utils","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"}]},{"id":"mIYcMR0CSSGGBV7xB0ag","title":"Secret Toolkit","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/smart-contract-tools-utils/secret-toolkit","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Smart contract - Tools/Utils"}]},{"id":"c4RONB5ZcboN07H2K0Ri","title":"CW-Plus","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/smart-contract-tools-utils/cw-plus","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Smart contract - Tools/Utils"}]},{"id":"DLUBYY8lMRIQ1Y7iYdZg","title":"Fadroma - SC framework","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/smart-contract-tools-utils/fadroma","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Smart contract - Tools/Utils"}]},{"id":"Os85AC48j3LMZpNDoTUw","title":"Hidden Gems","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/smart-contract-tools-utils/hidden-gems","siteSpaceId":"sitesp_pEM6o","description":"Quick breakdown of additional tools to use for development","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Smart contract - Tools/Utils"}]},{"id":"UclUlt34XYhCT0l0KdfE","title":"Other","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/smart-contract-tools-utils/contract-development","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Smart contract - Tools/Utils"}]},{"id":"b5bDVjmlY7jhZ80BxUS0","title":"Secret IDE","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/smart-contract-tools-utils/contract-development/secret-ide","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Smart contract - Tools/Utils"},{"label":"Other"}]},{"id":"GG6Xpr7sqxjbAFQRLmWm","title":"Polar","pathname":"/secret-network-documentation/development/example-contracts/tools-and-libraries/smart-contract-tools-utils/contract-development/polar","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Secret Contract - Reference, Guides, Examples","emoji":"1f440"},{"label":"Tools & Libraries"},{"label":"Smart contract - Tools/Utils"},{"label":"Other"}]},{"id":"CyyKwEuPEscqVCSVr5cj","title":"Frontend Development","pathname":"/secret-network-documentation/development/frontend","siteSpaceId":"sitesp_pEM6o","emoji":"1f5bc","description":"Learn how to connect Secret Network contracts to a frontend.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"}]},{"id":"7V231UZ4ttiLVkPjVdop","title":"Getting Started with SecretJS","pathname":"/secret-network-documentation/development/frontend/templates","siteSpaceId":"sitesp_pEM6o","description":"Learn how to install and use SecretJS.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Frontend Development","emoji":"1f5bc"}]},{"id":"MlJJEclGuO6ZsmOOgfhJ","title":"Usage Examples","pathname":"/secret-network-documentation/development/frontend/templates/usage-examples","siteSpaceId":"sitesp_pEM6o","description":"SecretJS usage examples.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Frontend Development","emoji":"1f5bc"},{"label":"Getting Started with SecretJS"}]},{"id":"N4Aqb3AV4SSFzFnWgnx8","title":"Sending Queries","pathname":"/secret-network-documentation/development/frontend/templates/usage-examples/sending-queries","siteSpaceId":"sitesp_pEM6o","description":"Learn how to send queries with SecretJS.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Frontend Development","emoji":"1f5bc"},{"label":"Getting Started with SecretJS"},{"label":"Usage Examples"}]},{"id":"p4B0HlxMua6BWPdhp3pA","title":"Sending Messages","pathname":"/secret-network-documentation/development/frontend/templates/usage-examples/sending-messages","siteSpaceId":"sitesp_pEM6o","description":"Learn how to send messages with SecretJS.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Frontend Development","emoji":"1f5bc"},{"label":"Getting Started with SecretJS"},{"label":"Usage Examples"}]},{"id":"1stNXSW4qU8Hrv0xXLW6","title":"Contract Migration","pathname":"/secret-network-documentation/development/frontend/templates/usage-examples/contract-migration","siteSpaceId":"sitesp_pEM6o","description":"Learn how to do contract migration with SecretJS.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Frontend Development","emoji":"1f5bc"},{"label":"Getting Started with SecretJS"},{"label":"Usage Examples"}]},{"id":"737Lw2GX3bprbBVYR9ZV","title":"Wallet Integrations","pathname":"/secret-network-documentation/development/frontend/templates/usage-examples/wallet-integrations","siteSpaceId":"sitesp_pEM6o","description":"Learn how to integrate various web3 wallets with SecretJS.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Frontend Development","emoji":"1f5bc"},{"label":"Getting Started with SecretJS"},{"label":"Usage Examples"}]},{"id":"aFoZhvxzGlsiXQ6BqELt","title":"Query Permits","pathname":"/secret-network-documentation/development/frontend/templates/usage-examples/query-permits","siteSpaceId":"sitesp_pEM6o","description":"Learn how to use query permits with SecretJS.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Frontend Development","emoji":"1f5bc"},{"label":"Getting Started with SecretJS"},{"label":"Usage Examples"}]},{"id":"pBSYmX70bMMmwdCguhXv","title":"SNIP20 (SCRT Tokens)","pathname":"/secret-network-documentation/development/frontend/templates/usage-examples/snip20-scrt-tokens","siteSpaceId":"sitesp_pEM6o","description":"Learn how to send SNIP20 tokens with SecretJS.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Frontend Development","emoji":"1f5bc"},{"label":"Getting Started with SecretJS"},{"label":"Usage Examples"}]},{"id":"TgDWaaIJOSNvOoZdtHJP","title":"SNIP721 (Secret NFTs)","pathname":"/secret-network-documentation/development/frontend/templates/usage-examples/snip721-secret-nfts","siteSpaceId":"sitesp_pEM6o","description":"Learn how to send SNIP721s with SecretJS.","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Frontend Development","emoji":"1f5bc"},{"label":"Getting Started with SecretJS"},{"label":"Usage Examples"}]},{"id":"HuaIClZLAGcAQsd3towM","title":"Feegrant","pathname":"/secret-network-documentation/development/frontend/feegrant","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Frontend Development","emoji":"1f5bc"}]},{"id":"g9vrdczosTBSZZRQ3ELm","title":"Understanding Feegrant allowances","pathname":"/secret-network-documentation/development/frontend/feegrant/understanding-feegrant-allowances","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Frontend Development","emoji":"1f5bc"},{"label":"Feegrant"}]},{"id":"H81prk3z31ZVoxIlJvHN","title":"Grant allowances","pathname":"/secret-network-documentation/development/frontend/feegrant/grant-allowances","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Frontend Development","emoji":"1f5bc"},{"label":"Feegrant"}]},{"id":"C0Y6GrJx70zr4ejvDH8q","title":"Using grant allowances to execute transactions","pathname":"/secret-network-documentation/development/frontend/feegrant/using-grant-allowances-to-execute-transactions","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Frontend Development","emoji":"1f5bc"},{"label":"Feegrant"}]},{"id":"Lc4dwHyF3TNAKGJDbyHJ","title":"Using the Fee Grant Faucet","pathname":"/secret-network-documentation/development/frontend/feegrant/using-the-fee-grant-faucet","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Frontend Development","emoji":"1f5bc"},{"label":"Feegrant"}]},{"id":"2oLSMkUi9U3VtxrdGBSm","title":"Deployment Addresses/ API Endpoints","pathname":"/secret-network-documentation/development/resources-api-contract-addresses","siteSpaceId":"sitesp_pEM6o","emoji":"1f4ec","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"}]},{"id":"H9uP5tQo1FKM4pqFRodY","title":"Secret (SNIP 20) token contracts list","pathname":"/secret-network-documentation/development/resources-api-contract-addresses/secret-token-contracts","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Deployment Addresses/ API Endpoints","emoji":"1f4ec"}]},{"id":"9i0qNJUDeIvFIzk1j5Ov","title":"SNIP Asset naming guidelines","pathname":"/secret-network-documentation/development/resources-api-contract-addresses/secret-token-contracts/snip-asset-naming-guidelines","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Deployment Addresses/ API Endpoints","emoji":"1f4ec"},{"label":"Secret (SNIP 20) token contracts list"}]},{"id":"hDfbvGXfrME21k5WkAhz","title":"Connecting to the Network","pathname":"/secret-network-documentation/development/resources-api-contract-addresses/connecting-to-the-network","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Deployment Addresses/ API Endpoints","emoji":"1f4ec"}]},{"id":"MkuzrhbFNmMJjB9fuONM","title":"API Endpoints Mainnet (Secret-4)","pathname":"/secret-network-documentation/development/resources-api-contract-addresses/connecting-to-the-network/mainnet-secret-4","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Deployment Addresses/ API Endpoints","emoji":"1f4ec"},{"label":"Connecting to the Network"}]},{"id":"VE9bqa7P5BNfsmxDbO2Z","title":"API Endpoints Testnet (Pulsar-3)","pathname":"/secret-network-documentation/development/resources-api-contract-addresses/connecting-to-the-network/testnet-pulsar-3","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Deployment Addresses/ API Endpoints","emoji":"1f4ec"},{"label":"Connecting to the Network"}]},{"id":"cOFZ1O9Zm93WgjqwgS8l","title":"Usage examples","pathname":"/secret-network-documentation/development/resources-api-contract-addresses/connecting-to-the-network/usage-examples","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Deployment Addresses/ API Endpoints","emoji":"1f4ec"},{"label":"Connecting to the Network"}]},{"id":"IDb2eDisFQu6U3YqWwqb","title":"Comparison of endpoint types","pathname":"/secret-network-documentation/development/resources-api-contract-addresses/connecting-to-the-network/comparison-of-endpoint-types","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Deployment Addresses/ API Endpoints","emoji":"1f4ec"},{"label":"Connecting to the Network"}]},{"id":"C65iPtjMTCzUr6UPSFgJ","title":"Create your own SNIP-25 IBC Token","pathname":"/secret-network-documentation/development/resources-api-contract-addresses/create-your-own-snip-25-ibc-token","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Development","emoji":"1f4bb"},{"label":"Deployment Addresses/ API Endpoints","emoji":"1f4ec"}]},{"id":"7iW4cEr3nQGrKNumjqx1","title":"Introduction","pathname":"/secret-network-documentation/secret-ai/introduction","siteSpaceId":"sitesp_pEM6o","emoji":"1f91d","description":"Secret AI is a Decentralized Confidential Computing solution that brings trusted AI to users who value their privacy","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"}]},{"id":"GPLBVfNmDajS4h0y89ns","title":"Architecture","pathname":"/secret-network-documentation/secret-ai/architecture","siteSpaceId":"sitesp_pEM6o","emoji":"1f3d7","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"}]},{"id":"ogY3c6vLqEkcvb39e3CA","title":"Secret AI SDK","pathname":"/secret-network-documentation/secret-ai/sdk","siteSpaceId":"sitesp_pEM6o","emoji":"1f469-1f4bb","description":"This page introduces Secret AI SDK and provides guidance and examples of how to use Secret AI SDK.","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"}]},{"id":"Fz2ea5lcNiuAtRvi0tc0","title":"SECRET AI SDK","pathname":"/secret-network-documentation/secret-ai/sdk/setting-up-your-environment","siteSpaceId":"sitesp_pEM6o","description":"This page introduces Secret AI SDK, provides guidance and examples how to use Secret AI SDK.","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Secret AI SDK","emoji":"1f469-1f4bb"}]},{"id":"0E38SmZc4GKMSKqSWKRP","title":"Installation","pathname":"/secret-network-documentation/secret-ai/sdk/setting-up-your-environment/installation","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Secret AI SDK","emoji":"1f469-1f4bb"},{"label":"SECRET AI SDK"}]},{"id":"abtwLrSINr60b3vg4mUt","title":"Authentication & Setup","pathname":"/secret-network-documentation/secret-ai/sdk/setting-up-your-environment/authentication-and-setup","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Secret AI SDK","emoji":"1f469-1f4bb"},{"label":"SECRET AI SDK"}]},{"id":"wFUXKUz8q6l6Xg1DsMiP","title":"Advanced Usage","pathname":"/secret-network-documentation/secret-ai/sdk/setting-up-your-environment/advanced-usage","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Secret AI SDK","emoji":"1f469-1f4bb"},{"label":"SECRET AI SDK"}]},{"id":"PT9xkOkSS73PBZXJyH4y","title":"API Reference","pathname":"/secret-network-documentation/secret-ai/sdk/setting-up-your-environment/api-reference","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Secret AI SDK","emoji":"1f469-1f4bb"},{"label":"SECRET AI SDK"}]},{"id":"JYJ50mfXoAEYf65WLs9Y","title":"Configuration Reference","pathname":"/secret-network-documentation/secret-ai/sdk/setting-up-your-environment/configuration-reference","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Secret AI SDK","emoji":"1f469-1f4bb"},{"label":"SECRET AI SDK"}]},{"id":"FbKW6vxc1QnPGRv7GBvZ","title":"OpenAI Compatibility","pathname":"/secret-network-documentation/secret-ai/sdk/setting-up-your-environment/openai-compatibility","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Secret AI SDK","emoji":"1f469-1f4bb"},{"label":"SECRET AI SDK"}]},{"id":"aYZgV5aT1PIxcH4aRFhN","title":"Tool/Function Calling","pathname":"/secret-network-documentation/secret-ai/sdk/setting-up-your-environment/tool-function-calling","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Secret AI SDK","emoji":"1f469-1f4bb"},{"label":"SECRET AI SDK"}]},{"id":"QA16hMoqgzOiJ9hkSjmB","title":"OpenAI-Compatible Example","pathname":"/secret-network-documentation/secret-ai/sdk/setting-up-your-environment/openai-compatible-example","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Secret AI SDK","emoji":"1f469-1f4bb"},{"label":"SECRET AI SDK"}]},{"id":"bw4olXIcBh4gCB8xXRBE","title":"Concurrency Support","pathname":"/secret-network-documentation/secret-ai/sdk/setting-up-your-environment/concurrency-support","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Secret AI SDK","emoji":"1f469-1f4bb"},{"label":"SECRET AI SDK"}]},{"id":"RdLExzLHIVARC1PvE6kh","title":"Testing","pathname":"/secret-network-documentation/secret-ai/sdk/setting-up-your-environment/testing","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Secret AI SDK","emoji":"1f469-1f4bb"},{"label":"SECRET AI SDK"}]},{"id":"QjoYd9AUv0O26wdYdaKE","title":"Troubleshooting","pathname":"/secret-network-documentation/secret-ai/sdk/setting-up-your-environment/troubleshooting","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Secret AI SDK","emoji":"1f469-1f4bb"},{"label":"SECRET AI SDK"}]},{"id":"CdqdSE0WQSLiz8SHcGfh","title":"Performance & Best Practices","pathname":"/secret-network-documentation/secret-ai/sdk/setting-up-your-environment/performance-and-best-practices","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Secret AI SDK","emoji":"1f469-1f4bb"},{"label":"SECRET AI SDK"}]},{"id":"qW7jJfsBWlorhdBVP9GS","title":"Running the Application","pathname":"/secret-network-documentation/secret-ai/sdk/running-the-application","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Secret AI SDK","emoji":"1f469-1f4bb"}]},{"id":"LNJgB1PRKJm9vK3YwIju","title":"Economics","pathname":"/secret-network-documentation/secret-ai/economics","siteSpaceId":"sitesp_pEM6o","emoji":"1fa99","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"}]},{"id":"tEiNJlv4Ujtygpei1ZrQ","title":"Smart Contract Reference","pathname":"/secret-network-documentation/secret-ai/smart-contract-reference","siteSpaceId":"sitesp_pEM6o","icon":"memo-circle-check","description":"Secret Network smart contracts used for Secret AI subscriptions, workers, and rewards management.","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"}]},{"id":"LSb2M22ReSwqwuekuaSE","title":"SubscriptionManager","pathname":"/secret-network-documentation/secret-ai/smart-contract-reference/subscriptionmanager","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Smart Contract Reference","icon":"memo-circle-check"}]},{"id":"T3CTB2GEjRwRZDaOnI2I","title":"WorkerManager","pathname":"/secret-network-documentation/secret-ai/smart-contract-reference/workermanager","siteSpaceId":"sitesp_pEM6o","description":"WorkerManager contract registers, manages and assigns Confidential GPU Workers","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Smart Contract Reference","icon":"memo-circle-check"}]},{"id":"fjTo13nmzvAcM93aLeyT","title":"RewardsManager","pathname":"/secret-network-documentation/secret-ai/smart-contract-reference/rewardsmanager","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Secret AI","icon":"starfighter-twin-ion-engine"},{"label":"Smart Contract Reference","icon":"memo-circle-check"}]},{"id":"BJPePAAEakyPd0DuLrJj","title":"Introduction","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/introduction","siteSpaceId":"sitesp_pEM6o","emoji":"1f91d","description":"SecretVM is Secret Network's solution for creating and running Confidential Virtual Machines.","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"}]},{"id":"3wgW1BFdFSYRHVnHedjf","title":"Architecture","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/architecture","siteSpaceId":"sitesp_pEM6o","emoji":"1f3d7","description":"The Anatomy of a Secret Virtual Machine.","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"}]},{"id":"blrfxELg9A17rHc0v3pj","title":"Supported Hardware Platforms","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/supported-hardware-platforms","siteSpaceId":"sitesp_pEM6o","icon":"server","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"}]},{"id":"ccs8zASeHVaaw14f2Q0V","title":"Attestation","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/attestation","siteSpaceId":"sitesp_pEM6o","emoji":"2611","description":"Topics related to Attestation","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"}]},{"id":"5TwpC9u2KCCF1MmtBlLF","title":"What is Attestation","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/attestation/what-is-attestation","siteSpaceId":"sitesp_pEM6o","icon":"comment-question","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Attestation","emoji":"2611"}]},{"id":"gEIS75wPzeO2QaAoIDvC","title":"Obtaining Attestation Data","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/attestation/obtaining-attestation-data","siteSpaceId":"sitesp_pEM6o","icon":"ruler","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Attestation","emoji":"2611"}]},{"id":"K4WXVqKqGbuFyQDCfjW2","title":"Intel TDX Attestation Report - Key Fields","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/attestation/attestation-report-key-fields","siteSpaceId":"sitesp_pEM6o","icon":"pencil","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Attestation","emoji":"2611"}]},{"id":"PaAwCcWDXt1mhDLbkF0a","title":"Intel Trust Authority","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/attestation/intel-trust-authority","siteSpaceId":"sitesp_pEM6o","emoji":"1f4dd","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Attestation","emoji":"2611"}]},{"id":"3ruIXBMw4hxBP48bZWpY","title":"AMD SEV-SNP Attestation Report - Key Fields","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/attestation/amd-sev-snp-attestation-report-key-fields","siteSpaceId":"sitesp_pEM6o","icon":"pencil","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Attestation","emoji":"2611"}]},{"id":"nTZalpLRG0PDQg4i3Vvm","title":"Chain of Trust","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/attestation/chain-of-trust","siteSpaceId":"sitesp_pEM6o","icon":"link","description":"This page describes how the chain of trust works on SecretVMs","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Attestation","emoji":"2611"}]},{"id":"4YML2TlPYgPz0XCX62TK","title":"Launching a SecretVM","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/launching-a-secretvm","siteSpaceId":"sitesp_pEM6o","emoji":"1f3c1","description":"","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"}]},{"id":"G6vMJcZnakafqV4gGKqS","title":"Using Custom Domain Names","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/launching-a-secretvm/using-custom-domain-names","siteSpaceId":"sitesp_pEM6o","emoji":"1f6a9","description":"How to launch a SecretVM under a custom domain name","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Launching a SecretVM","emoji":"1f3c1"}]},{"id":"tWtgkXLor4P9YBTOrgfg","title":"Using Private Container Registries","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/launching-a-secretvm/using-private-container-registries","siteSpaceId":"sitesp_pEM6o","emoji":"1f510","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Launching a SecretVM","emoji":"1f3c1"}]},{"id":"2UyKowZUdc1vZCz5j8mW","title":"Hiding Runtime Info","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/launching-a-secretvm/hiding-runtime-info","siteSpaceId":"sitesp_pEM6o","emoji":"1f576","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Launching a SecretVM","emoji":"1f3c1"}]},{"id":"oJ6z3LGLHBDT26jYgTPU","title":"Choosing the KMS provider","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/launching-a-secretvm/choosing-the-kms-provider","siteSpaceId":"sitesp_pEM6o","emoji":"1f511","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Launching a SecretVM","emoji":"1f3c1"}]},{"id":"1dBWIqvVaCuW4oEvoCn6","title":"Providing Additional Files to Docker","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/launching-a-secretvm/providing-additional-files-to-docker","siteSpaceId":"sitesp_pEM6o","emoji":"1f4c2","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Launching a SecretVM","emoji":"1f3c1"}]},{"id":"aRbYNFjcfXK6AD8QdiRW","title":"Managing SecretVM Lifecycle","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/managing-secretvm-lifecycle","siteSpaceId":"sitesp_pEM6o","emoji":"1f6e0","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"}]},{"id":"OibZjBpnZ7GPys8S9spP","title":"Viewing Logs","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/managing-secretvm-lifecycle/viewing-logs","siteSpaceId":"sitesp_pEM6o","emoji":"1f5d2","description":"How to view SecretVM Logs","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Managing SecretVM Lifecycle","emoji":"1f6e0"}]},{"id":"yubQy4GDoAA9ycQCMgLi","title":"Log Forwarding","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/managing-secretvm-lifecycle/log-forwarding","siteSpaceId":"sitesp_pEM6o","emoji":"1fab5","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Managing SecretVM Lifecycle","emoji":"1f6e0"}]},{"id":"GaesafLi0bgWJvlXJObd","title":"SecretVM Upgradeability","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/managing-secretvm-lifecycle/secretvm-upgradeability","siteSpaceId":"sitesp_pEM6o","emoji":"23eb","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Managing SecretVM Lifecycle","emoji":"1f6e0"}]},{"id":"9dvyHq5mqYTGSq6bvOzE","title":"Verifying a SecretVM","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/verifying-a-secretvm","siteSpaceId":"sitesp_pEM6o","emoji":"2705","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"}]},{"id":"U8zL7lelgeusajIM3KgB","title":"Full Verification","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/verifying-a-secretvm/full-verification","siteSpaceId":"sitesp_pEM6o","emoji":"1f422","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Verifying a SecretVM","emoji":"2705"}]},{"id":"0JTpA3RIZBzXeOeAmSwg","title":"Quick Verification","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/verifying-a-secretvm/quick-verification","siteSpaceId":"sitesp_pEM6o","emoji":"1f430","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Verifying a SecretVM","emoji":"2705"}]},{"id":"ES2SmxwALJvqLhWUvQzi","title":"Agentic Support","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/agentic-support","siteSpaceId":"sitesp_pEM6o","emoji":"1f916","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"}]},{"id":"qAIbLe3pGj78iF43zhQ7","title":"EIP-8004 Support","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/agentic-support/eip-8004-support","siteSpaceId":"sitesp_pEM6o","emoji":"1f4c3","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Agentic Support","emoji":"1f916"}]},{"id":"teYgh3Zl54vWhaBBhPlW","title":"Creating a VM with ERC-8004 registration","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/agentic-support/eip-8004-support/creating-a-vm-with-erc-8004-registration","siteSpaceId":"sitesp_pEM6o","emoji":"2728","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Agentic Support","emoji":"1f916"},{"label":"EIP-8004 Support","emoji":"1f4c3"}]},{"id":"3GQY1Lv4qXt0OYr2mLsV","title":"What ERC-8004 stores","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/agentic-support/eip-8004-support/what-erc-8004-stores","siteSpaceId":"sitesp_pEM6o","emoji":"2139","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Agentic Support","emoji":"1f916"},{"label":"EIP-8004 Support","emoji":"1f4c3"}]},{"id":"5FEWffen6WlbHrfUZ9jp","title":"SecretVM services","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/agentic-support/eip-8004-support/secretvm-services","siteSpaceId":"sitesp_pEM6o","emoji":"1f37d","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Agentic Support","emoji":"1f916"},{"label":"EIP-8004 Support","emoji":"1f4c3"}]},{"id":"pvAfaBHqnfcmeO6lKP8S","title":"Viewing Agentic Settings after deployment","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/agentic-support/eip-8004-support/viewing-agentic-settings-after-deployment","siteSpaceId":"sitesp_pEM6o","emoji":"1f453","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Agentic Support","emoji":"1f916"},{"label":"EIP-8004 Support","emoji":"1f4c3"}]},{"id":"VZyOdOj4fHWPnpzcrxFU","title":"SecretVM REST API for Agents (x402)","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/agentic-support/secretvm-rest-api-for-agents-x402","siteSpaceId":"sitesp_pEM6o","emoji":"1f4b0","description":"This page describes the REST API with x402 support","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Agentic Support","emoji":"1f916"}]},{"id":"r7eYw6pegNBKaV79NX3d","title":"SecretVM CLI","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/secretvm-cli","siteSpaceId":"sitesp_pEM6o","emoji":"1f468-1f4bb","description":"","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"}]},{"id":"ZiJNuw3GhxBALnOSOt9F","title":"Getting started","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/secretvm-cli/getting-started","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"SecretVM CLI","emoji":"1f468-1f4bb"}]},{"id":"fssWsx8OXGJ4GFNz6o7g","title":"Authentication Commands","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/secretvm-cli/authentication-commands","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"SecretVM CLI","emoji":"1f468-1f4bb"}]},{"id":"J6G5KQXN3pWcKFOgQZZv","title":"Virtual Machine Commands","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/secretvm-cli/virtual-machine-commands","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"SecretVM CLI","emoji":"1f468-1f4bb"}]},{"id":"33NDQM319QgA00qGdm4J","title":"Attestation Verification Commands","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/secretvm-cli/attestation-verification-commands","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"SecretVM CLI","emoji":"1f468-1f4bb"}]},{"id":"7AF0n0xNpkaaEx5FRfjg","title":"Best Practices for Developers","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/best-practices-for-developers","siteSpaceId":"sitesp_pEM6o","emoji":"1f4a1","description":"How to create verifiable workloads","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"}]},{"id":"ugp8oD9oderUtGmGbtyq","title":"Generating Github Workflows","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/best-practices-for-developers/generating-github-workflows","siteSpaceId":"sitesp_pEM6o","emoji":"1f916","description":"How to automatically create verifiable GitHub workflows","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"},{"label":"Best Practices for Developers","emoji":"1f4a1"}]},{"id":"GuHpoLFlNsn3ZWasPhtu","title":"Verifiable Message Signing","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/verifiable-message-signing","siteSpaceId":"sitesp_pEM6o","emoji":"1f510","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"}]},{"id":"s93LKgsXfrJ0BD1jV4o4","title":"Glossary","pathname":"/secret-network-documentation/secretvm-confidential-virtual-machines/glossary","siteSpaceId":"sitesp_pEM6o","emoji":"1f4d6","description":"Useful notions related to SecretVM","breadcrumbs":[{"label":"SecretVM - Confidential Virtual Machines","emoji":"1f310"}]},{"id":"ScuIHgFhICqK1lNe9AVk","title":"IBC Developer Toolkit","pathname":"/secret-network-documentation/confidential-computing-layer/ibc","siteSpaceId":"sitesp_pEM6o","emoji":"1f9d1-1f680","description":"Learn how to use Secret Network's IBC Developer Toolkit to design dApps with confidential computing.","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"}]},{"id":"4u1vbc7OuN4WPKVCSVve","title":"Basics","pathname":"/secret-network-documentation/confidential-computing-layer/ibc/basics","siteSpaceId":"sitesp_pEM6o","description":"Learn the basics of working with the IBC Developer Toolkit","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"IBC Developer Toolkit","emoji":"1f9d1-1f680"}]},{"id":"neXJrPLcos0lofDA0F4L","title":"Overview","pathname":"/secret-network-documentation/confidential-computing-layer/ibc/basics/overview","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"IBC Developer Toolkit","emoji":"1f9d1-1f680"},{"label":"Basics"}]},{"id":"khFRWuF28zfOhB2hILdY","title":"Cross-chain Messaging with IBC Hooks","pathname":"/secret-network-documentation/confidential-computing-layer/ibc/basics/cross-chain-messaging-with-ibc-hooks","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"IBC Developer Toolkit","emoji":"1f9d1-1f680"},{"label":"Basics"}]},{"id":"D7SEHzqR4rTWSVRKb3do","title":"Functions, Methods, and Data Structures","pathname":"/secret-network-documentation/confidential-computing-layer/ibc/basics/cross-chain-messaging-with-ibc-hooks/functions-methods-and-data-structures","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"IBC Developer Toolkit","emoji":"1f9d1-1f680"},{"label":"Basics"},{"label":"Cross-chain Messaging with IBC Hooks"}]},{"id":"FF9nfpkn0I1z0A2wLNXM","title":"Typescript SDK","pathname":"/secret-network-documentation/confidential-computing-layer/ibc/basics/cross-chain-messaging-with-ibc-hooks/typescript-sdk","siteSpaceId":"sitesp_pEM6o","description":"CCL IBC SDK for typescript developers","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"IBC Developer Toolkit","emoji":"1f9d1-1f680"},{"label":"Basics"},{"label":"Cross-chain Messaging with IBC Hooks"}]},{"id":"zvn2eWKi2BdTdpgjLgsO","title":"IBC-Hooks","pathname":"/secret-network-documentation/confidential-computing-layer/ibc/basics/cross-chain-messaging-with-ibc-hooks/ibc-hooks","siteSpaceId":"sitesp_pEM6o","description":"Initiate a contract call with an incoming IBC token transfer using IBC hooks","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"IBC Developer Toolkit","emoji":"1f9d1-1f680"},{"label":"Basics"},{"label":"Cross-chain Messaging with IBC Hooks"}]},{"id":"BQZEKqkNr4DVHlX8EHWn","title":"IBC Relaying with Go Relayer","pathname":"/secret-network-documentation/confidential-computing-layer/ibc/basics/ibc-relaying-with-go-relayer","siteSpaceId":"sitesp_pEM6o","description":"Learn how to run the Go relayer to create a transfer channel between any Cosmos chain and Secret Network.","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"IBC Developer Toolkit","emoji":"1f9d1-1f680"},{"label":"Basics"}]},{"id":"kwkMtUnOicmDn2xCpeSr","title":"Usecases","pathname":"/secret-network-documentation/confidential-computing-layer/ibc/usecases","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"IBC Developer Toolkit","emoji":"1f9d1-1f680"}]},{"id":"enDilsBHwbQJDGrUzXov","title":"Storing Encrypted Data on Secret Network","pathname":"/secret-network-documentation/confidential-computing-layer/ibc/usecases/storing-encrypted-data-on-secret-network","siteSpaceId":"sitesp_pEM6o","description":"Learn how to use Secret Network as the confidential computation layer of the Cosmos","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"IBC Developer Toolkit","emoji":"1f9d1-1f680"},{"label":"Usecases"}]},{"id":"eRAbLZob3yvepRZrvxYf","title":"Key-Value store Developer Tutorial","pathname":"/secret-network-documentation/confidential-computing-layer/ibc/usecases/storing-encrypted-data-on-secret-network/key-value-store-developer-tutorial","siteSpaceId":"sitesp_pEM6o","description":"Learn how to use Secret Network as the confidential computation layer of the Cosmos with IBC hooks","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"IBC Developer Toolkit","emoji":"1f9d1-1f680"},{"label":"Usecases"},{"label":"Storing Encrypted Data on Secret Network"}]},{"id":"dm7n0VN0iFK1til7sbQD","title":"Secret VRF for IBC with IBC-Hooks","pathname":"/secret-network-documentation/confidential-computing-layer/ibc/usecases/secret-vrf-for-ibc-with-ibc-hooks","siteSpaceId":"sitesp_pEM6o","description":"Verifiable on-chain random number generator for the entire Cosmos.","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"IBC Developer Toolkit","emoji":"1f9d1-1f680"},{"label":"Usecases"}]},{"id":"y7uuBRQRZa8VumYa1pfR","title":"Confidential Voting","pathname":"/secret-network-documentation/confidential-computing-layer/ibc/usecases/confidential-voting","siteSpaceId":"sitesp_pEM6o","description":"A fullstack  tutorial for cross-chain confidential voting on IBC-connected chains.","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"IBC Developer Toolkit","emoji":"1f9d1-1f680"},{"label":"Usecases"}]},{"id":"MvUNIFrckJxFrXLYEUlA","title":"Sealed Bid Auctions","pathname":"/secret-network-documentation/confidential-computing-layer/ibc/usecases/sealed-bid-auctions","siteSpaceId":"sitesp_pEM6o","description":"A fullstack tutorial for cross-chain confidential sealed bid auctions on IBC-connected chains.","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"IBC Developer Toolkit","emoji":"1f9d1-1f680"},{"label":"Usecases"}]},{"id":"1joCVTsN65tJqi2sPilN","title":"Supported Networks","pathname":"/secret-network-documentation/confidential-computing-layer/ibc/supported-networks","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"IBC Developer Toolkit","emoji":"1f9d1-1f680"}]},{"id":"G2KYNGpvXNHC68iSwq5w","title":"Mainnet","pathname":"/secret-network-documentation/confidential-computing-layer/ibc/supported-networks/mainnet","siteSpaceId":"sitesp_pEM6o","description":"Secret Network's IBC CCL SDK is available on IBC hooks-enabled chains with an IBC transfer channel enabled for Secret Network.","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"IBC Developer Toolkit","emoji":"1f9d1-1f680"},{"label":"Supported Networks"}]},{"id":"78rv3F1w01YJLjPTWecd","title":"Testnet","pathname":"/secret-network-documentation/confidential-computing-layer/ibc/supported-networks/testnet","siteSpaceId":"sitesp_pEM6o","description":"Secret Network's IBC CCL SDK is available on IBC hooks-enabled chains with an IBC transfer channel enabled for Secret Network.","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"IBC Developer Toolkit","emoji":"1f9d1-1f680"},{"label":"Supported Networks"}]},{"id":"UiiAngs4vYtOEwc46rQx","title":"Ethereum (EVM) Developer Toolkit","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit","siteSpaceId":"sitesp_pEM6o","emoji":"1f91d","description":"Learn how to use Secret Network's EVM Toolkit to design dApps with confidential computing on the EVM.","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"}]},{"id":"JkLbkIjSbBSfKUxVWWWJ","title":"Basics","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/basics","siteSpaceId":"sitesp_pEM6o","description":"Learn the basics of working with the EVM Developer Toolkit","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"}]},{"id":"brsm7TVphcC5IWtZdtEi","title":"Overview","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/basics/overview","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Basics"}]},{"id":"kyI9s0ax7MNeIxRKLBaZ","title":"Connecting Metamask to Secret Network","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/basics/connecting-metamask-to-secret-network","siteSpaceId":"sitesp_pEM6o","description":"Learn how to connect your Metamask wallet address to a Secret wallet address.","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Basics"}]},{"id":"qpwSm6pcJm9Q34trpwjQ","title":"SecretPath + Reown integration","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/basics/connecting-metamask-to-secret-network-1","siteSpaceId":"sitesp_pEM6o","description":"Learn how to connect EVM compatible chains with Secret Network using Reown (Formerly called WalletConnect).","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Basics"}]},{"id":"Tw3xmc57fDlVCLztJ3in","title":"Cross-chain Messaging","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/basics/cross-chain-messaging","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Basics"}]},{"id":"yxBtISW2HaSw9ozZREHN","title":"SecretPath","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/basics/cross-chain-messaging/secretpath","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Basics"},{"label":"Cross-chain Messaging"}]},{"id":"Z0OnBWwCDc1uOEUbdonP","title":"Architecture Overview","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/basics/cross-chain-messaging/secretpath/architecture-overview","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Basics"},{"label":"Cross-chain Messaging"},{"label":"SecretPath"}]},{"id":"jYZupkGiyM6heCtcvgNY","title":"Detailed Architecture","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/basics/cross-chain-messaging/secretpath/detailed-architecture","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Basics"},{"label":"Cross-chain Messaging"},{"label":"SecretPath"}]},{"id":"pdaZoJ3L4nVLmiV2eos0","title":"SecretPath Developer Tutorials","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/basics/cross-chain-messaging/secretpath/secretpath-developer-tutorials","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Basics"},{"label":"Cross-chain Messaging"},{"label":"SecretPath"}]},{"id":"0BFZEhk6AFIfUAzaX9Sf","title":"Public EVM Gateway Architecture","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/basics/cross-chain-messaging/secretpath/public-evm-gateway-architecture","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Basics"},{"label":"Cross-chain Messaging"},{"label":"SecretPath"}]},{"id":"WqZPGEkI3Z0lmAseqwwb","title":"How to deploy SecretPath on your chain","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/basics/cross-chain-messaging/secretpath/how-to-deploy-secretpath-on-your-chain","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Basics"},{"label":"Cross-chain Messaging"},{"label":"SecretPath"}]},{"id":"4PKpAka45yWyWMgWlFcg","title":"Axelar GMP","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/basics/cross-chain-messaging/axelar-gmp","siteSpaceId":"sitesp_pEM6o","description":"Learn how to use Axelar General Message Passing in order to send messages between EVM chains and Secret Network","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Basics"},{"label":"Cross-chain Messaging"}]},{"id":"CuN7AE7dzJbIb2Td0G3D","title":"Architecture Overview","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/basics/cross-chain-messaging/axelar-gmp/architecture-overview","siteSpaceId":"sitesp_pEM6o","description":"Learn how to use Axelar General Message Passing in order to send messages between EVM chains and Secret Network","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Basics"},{"label":"Cross-chain Messaging"},{"label":"Axelar GMP"}]},{"id":"2zckHsaazAC71iqkl2SQ","title":"Axelar GMP Developer Tutorial","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/basics/cross-chain-messaging/axelar-gmp/evm-general-message-passing","siteSpaceId":"sitesp_pEM6o","description":"Learn how to use Axelar General Message Passing in order to send messages between EVM chains and Secret Network","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Basics"},{"label":"Cross-chain Messaging"},{"label":"Axelar GMP"}]},{"id":"rV2FbkG29Xb9UMalaYMw","title":"Usecases","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"}]},{"id":"ugMDmlKOXURQXNH4bx33","title":"Storing Encrypted Data on Secret Network","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/storing-encrypted-data-on-secret-network","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Usecases"}]},{"id":"hryun7mnygQOwhawmCpU","title":"Key-Value store Developer Tutorial","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/storing-encrypted-data-on-secret-network/key-value-store-developer-tutorial","siteSpaceId":"sitesp_pEM6o","description":"Learn how to use SecretPath on EVM to encrypt payloads.","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Usecases"},{"label":"Storing Encrypted Data on Secret Network"}]},{"id":"V0q8MQXrIlSAg2uIcqCj","title":"Sealed Bid Auction","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/sealed-bid-auction","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Usecases"}]},{"id":"O1BDuFoCCoHF8nI0R2S0","title":"Sealed Bid Auction Developer Tutorial","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/sealed-bid-auction/sealed-bid-auction-developer-tutorial","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Usecases"},{"label":"Sealed Bid Auction"}]},{"id":"EANXtJ4kzJRmvngc6Ai1","title":"Confidential Voting","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/confidential-voting","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Usecases"}]},{"id":"KT0c0IgY0Zhq6JBB4aHv","title":"Confidential Voting Developer Tutorial with SecretPath","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/confidential-voting/confidential-voting-developer-tutorial-with-secretpath","siteSpaceId":"sitesp_pEM6o","description":"Learn how to use SecretPath to vote confidentially on the EVM","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Usecases"},{"label":"Confidential Voting"}]},{"id":"0wzJN9lgu32FFc6zwEL0","title":"VRF","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/vrf","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Usecases"}]},{"id":"ySFID40lvT5h0skdKEAo","title":"Implementing VRF into any EVM Contract","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/vrf/implementing-vrf-into-any-evm-contract","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Usecases"},{"label":"VRF"}]},{"id":"JsgOXQBt22Cc9GxGKsQj","title":"VRF Developer Tutorial","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/vrf/vrf-developer-tutorial","siteSpaceId":"sitesp_pEM6o","description":"Learn how to use SecretPath on EVM to access on-chain verifiable random numbers.","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Usecases"},{"label":"VRF"}]},{"id":"mq5qqToBr8ltK5Uptw6j","title":"Performance figures of SecretVRF vs competitors","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/vrf/performance-figures-of-secretvrf-vs-competitors","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Usecases"},{"label":"VRF"}]},{"id":"x50hlBG91fWipD4Zb9In","title":"Using encrypted payloads for VRF","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/vrf/using-encrypted-payloads-for-vrf","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Usecases"},{"label":"VRF"}]},{"id":"06NxM1Ezo9iatQ8XYhHi","title":"Converting from Chainlink VRF to Secret VRF in four steps","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/vrf/converting-from-chainlink-vrf-to-secret-vrf-in-four-steps","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Usecases"},{"label":"VRF"}]},{"id":"NFIhFPUblvFUcLuKH70A","title":"Confidential Document Sharing","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/confidential-document-sharing","siteSpaceId":"sitesp_pEM6o","description":"Learn how to store and share confidential documents on the EVM using Secret Network.","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Usecases"}]},{"id":"zv5oxW6AuEWbqQl2MmSv","title":"Tokens","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/tokens","siteSpaceId":"sitesp_pEM6o","description":"Learn how to send tokens cross-chain from EVM to Secret Network and vice versa","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Usecases"}]},{"id":"FJr3yEDwPAgnSYpUKCTF","title":"From EVM to Secret","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/usecases/tokens/from-evm-to-secret","siteSpaceId":"sitesp_pEM6o","description":"Learn how to send testnet USDC from EVM to Secret Network using Axelar","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Usecases"},{"label":"Tokens"}]},{"id":"ihmDFtytgOoDKJEjUnvf","title":"Supported Networks","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/supported-networks","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"}]},{"id":"vVkYeiwSdBnFoze06QF2","title":"EVM","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/supported-networks/evm","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Supported Networks"}]},{"id":"Vj8SvsakXGiYHp4NPgp2","title":"EVM Mainnet","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/supported-networks/evm/evm-mainnet-gateway-contracts","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Supported Networks"},{"label":"EVM"}]},{"id":"R05MQQsGGLsaWG5b3tKS","title":"EVM Testnet","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/supported-networks/evm/evm-testnet-gateway-contracts","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Supported Networks"},{"label":"EVM"}]},{"id":"EsUKQfVRbBjLvewVO38D","title":"Gateway Contract ABI","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/supported-networks/evm/gateway-contract-abi","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Supported Networks"},{"label":"EVM"}]},{"id":"T0CCPOB5MIDgU7qQglDX","title":"Secret Gateway","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/supported-networks/secret-gateway","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Supported Networks"}]},{"id":"ia0ADGMw2O4YSPjMeek5","title":"SecretPath mainnet (secret-4) contracts","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/supported-networks/secret-gateway/secretpath-mainnet-secret-4-contracts","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Supported Networks"},{"label":"Secret Gateway"}]},{"id":"z8sEKSXbgnxahzuAc7cD","title":"SecretPath testnet (pulsar-3) contracts","pathname":"/secret-network-documentation/confidential-computing-layer/ethereum-evm-developer-toolkit/supported-networks/secret-gateway/secretpath-testnet-pulsar-3-contracts","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Ethereum (EVM) Developer Toolkit","emoji":"1f91d"},{"label":"Supported Networks"},{"label":"Secret Gateway"}]},{"id":"ME3uL7AwSr09coLUuY7i","title":"Solana Developer Toolkit","pathname":"/secret-network-documentation/confidential-computing-layer/solana-developer-toolkit","siteSpaceId":"sitesp_pEM6o","emoji":"1f64c","description":"Learn how to use Secret Network's Solana Toolkit to design dApps with confidential computing on Solana.","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"}]},{"id":"XabMQ9lLNjBQOyyZ6CwO","title":"Usecases","pathname":"/secret-network-documentation/confidential-computing-layer/solana-developer-toolkit/usecases","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Solana Developer Toolkit","emoji":"1f64c"}]},{"id":"3eT62AGdDRsrFkdOnKak","title":"Storing Encrypted Data on Secret Network","pathname":"/secret-network-documentation/confidential-computing-layer/solana-developer-toolkit/usecases/storing-encrypted-data-on-secret-network","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Solana Developer Toolkit","emoji":"1f64c"},{"label":"Usecases"}]},{"id":"tXxkNfXP5yR9Nb3ec2MV","title":"Key-value Store Developer Tutorial","pathname":"/secret-network-documentation/confidential-computing-layer/solana-developer-toolkit/usecases/storing-encrypted-data-on-secret-network/using-encrypted-payloads-for-vrf","siteSpaceId":"sitesp_pEM6o","description":"Learn how to send encrypted strings from Solana to Secret Network","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Solana Developer Toolkit","emoji":"1f64c"},{"label":"Usecases"},{"label":"Storing Encrypted Data on Secret Network"}]},{"id":"lEMeoUxEEMN9nq3X466G","title":"VRF","pathname":"/secret-network-documentation/confidential-computing-layer/solana-developer-toolkit/usecases/vrf","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Solana Developer Toolkit","emoji":"1f64c"},{"label":"Usecases"}]},{"id":"DyCF1qMMjnhj2ctFmnFv","title":"VRF Developer Tutorial","pathname":"/secret-network-documentation/confidential-computing-layer/solana-developer-toolkit/usecases/vrf/using-encrypted-payloads-for-vrf","siteSpaceId":"sitesp_pEM6o","description":"Learn how to send encrypted on-chain random numbers to Solana from Secret Network","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Solana Developer Toolkit","emoji":"1f64c"},{"label":"Usecases"},{"label":"VRF"}]},{"id":"KiLtfgMX1WRoGwIWP6kI","title":"Program IDs","pathname":"/secret-network-documentation/confidential-computing-layer/solana-developer-toolkit/program-ids","siteSpaceId":"sitesp_pEM6o","description":"See here for Solana Mainnet, Devnet, and Testnet Program IDs, as well as Solana SecretPath IDL","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Solana Developer Toolkit","emoji":"1f64c"}]},{"id":"3lVBtl44ny7xpgmU6zuc","title":"Solana Mainnet & Testnet","pathname":"/secret-network-documentation/confidential-computing-layer/solana-developer-toolkit/program-ids/solana-mainnet-and-testnet","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Solana Developer Toolkit","emoji":"1f64c"},{"label":"Program IDs"}]},{"id":"JcTjeLSrW6WG9heHLQzT","title":"Gateway Contract IDL","pathname":"/secret-network-documentation/confidential-computing-layer/solana-developer-toolkit/program-ids/gateway-contract-idl","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Confidential Computing Layer","emoji":"1f513"},{"label":"Solana Developer Toolkit","emoji":"1f64c"},{"label":"Program IDs"}]},{"id":"r4Ms7gogusIk3giuL5SU","title":"Secret Network Overview","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/secret-network-overview","siteSpaceId":"sitesp_pEM6o","emoji":"1f680","description":"One-page overview of Secret Network","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"}]},{"id":"cjfoubr7taBUCpkLQntJ","title":"The SCRT coin","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/secret-network-overview/scrt-and-sscrt","siteSpaceId":"sitesp_pEM6o","description":"Learn about the SCRT coin, native to the Secret Network","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Secret Network Overview","emoji":"1f680"}]},{"id":"gojRY6442DbPnu4ohuDJ","title":"Private Tokens","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/secret-network-overview/private-tokens","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Secret Network Overview","emoji":"1f680"}]},{"id":"Gsjsgbql3Nbgyc5FhlFB","title":"Use Cases","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/secret-network-overview/use-cases","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Secret Network Overview","emoji":"1f680"}]},{"id":"zoqsiUpEpL9MLrcjNxaC","title":"Decentralized Finance (DeFi)","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/secret-network-overview/use-cases/decentralized-finance-defi","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Secret Network Overview","emoji":"1f680"},{"label":"Use Cases"}]},{"id":"9O1cHvm4HuL4Ep41kyqF","title":"Art And Digital Media","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/secret-network-overview/use-cases/art-and-digital-media","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Secret Network Overview","emoji":"1f680"},{"label":"Use Cases"}]},{"id":"s1PcGGQsYVh8jzksXyJY","title":"Gaming","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/secret-network-overview/use-cases/gaming","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Secret Network Overview","emoji":"1f680"},{"label":"Use Cases"}]},{"id":"CbeAe6klmcWAa2fnn5G8","title":"Data Privacy","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/secret-network-overview/use-cases/data-privacy","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Secret Network Overview","emoji":"1f680"},{"label":"Use Cases"}]},{"id":"ETJIFES2kd1mhmwnSarF","title":"Payments And Transactions","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/secret-network-overview/use-cases/payments-and-transactions","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Secret Network Overview","emoji":"1f680"},{"label":"Use Cases"}]},{"id":"ak6fMBcFsWxoYQgtagfn","title":"Communication","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/secret-network-overview/use-cases/communication","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Secret Network Overview","emoji":"1f680"},{"label":"Use Cases"}]},{"id":"UneSGnlQN4avfLsEcSEo","title":"The technology","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/secret-network-overview/the-technology","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Secret Network Overview","emoji":"1f680"}]},{"id":"jJJUZf5TGes6fGHS1wPo","title":"History","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/secret-network-overview/history","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Secret Network Overview","emoji":"1f680"}]},{"id":"HUwr7IRWcrsd6KVeipc8","title":"Roadmap (Core development)","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/secret-network-overview/roadmap","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Secret Network Overview","emoji":"1f680"}]},{"id":"O3kGKVSKFDqfonC5Q5L9","title":"Secret 2.0","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/secret-network-overview/roadmap/secret-2.0","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Secret Network Overview","emoji":"1f680"},{"label":"Roadmap (Core development)"}]},{"id":"m2GtYZsXpTCh7UuGZLjW","title":"Where To Buy SCRT?","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/secret-network-overview/where-to-buy-scrt","siteSpaceId":"sitesp_pEM6o","description":"Places to buy, sell, and store SCRT","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Secret Network Overview","emoji":"1f680"}]},{"id":"6p8AstTCLBppci5xonqV","title":"Using the Testnet","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/secret-network-overview/testnet","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Secret Network Overview","emoji":"1f680"}]},{"id":"WpEISq4RRf4Z3d5TvjIf","title":"Ecosystem Overview","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview","siteSpaceId":"sitesp_pEM6o","emoji":"1f438","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"}]},{"id":"wF32kYyDGWLpd88H0Fbh","title":"Wallets","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/wallets","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"}]},{"id":"edrm0MZY0DZtNkZHSdSa","title":"Applications","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/applications","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"}]},{"id":"R9qWPWT9YiHL2ez1VvWw","title":"Explorers & tools","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/explorers-and-tools","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"}]},{"id":"sWITvmJfejLBhruBYDD9","title":"Funding","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/funding","siteSpaceId":"sitesp_pEM6o","description":"General overview of how funding works on Secret Network","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"}]},{"id":"JoPcqoU3SimfEbj2KiCc","title":"SCRT Labs Grants","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/funding/secret-labs-grants","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"},{"label":"Funding"}]},{"id":"T4ujEcgU8m3R7r2CxqVu","title":"Dilutive funding/VC raise","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/funding/ecosystem-fund","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"},{"label":"Funding"}]},{"id":"8r0kFMO6DatCzoAIr5NS","title":"Community Pool","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/funding/community-pool","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"},{"label":"Funding"}]},{"id":"fuUtka9qoHG6Di6WnG9I","title":"Developer bounties","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/funding/developer-bounties","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"},{"label":"Funding"}]},{"id":"eSedgheD5phhBy3AQ8it","title":"SCRT Labs bounties [on-hold]","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/funding/developer-bounties/scrt-labs-bounties","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"},{"label":"Funding"},{"label":"Developer bounties"}]},{"id":"4Aos4ilgQTDEFjDKiNGe","title":"CCBL [on-hold]","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/funding/developer-bounties/ccbl","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"},{"label":"Funding"},{"label":"Developer bounties"}]},{"id":"G5FEJIbE51KTQdM40el2","title":"CCR [On-hold]","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/funding/developer-bounties/ccr-and-ccbl","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"},{"label":"Funding"},{"label":"Developer bounties"}]},{"id":"iwS3xPzWQPSiAk1SBzIm","title":"Application specific","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/funding/application-specific","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"},{"label":"Funding"}]},{"id":"ARYml7XPJAjA5z2JBZjN","title":"Shade Grants","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/funding/application-specific/shade-grants","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"},{"label":"Funding"},{"label":"Application specific"}]},{"id":"mvOLjwYFSCfymLT1hzq7","title":"Contributors & Entities","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/contributors-and-entities","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"}]},{"id":"9pfpd2VVNGaQTgEvcbR3","title":"Validators","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/contributors-and-entities/validators","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"},{"label":"Contributors & Entities"}]},{"id":"OqfarmMpCvKXDWxNTeE2","title":"SCRT Labs","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/contributors-and-entities/secret-labs","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"},{"label":"Contributors & Entities"}]},{"id":"wO6ZWO4guSJok98vLZdf","title":"Secret Foundation","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/contributors-and-entities/secret-foundation","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"},{"label":"Contributors & Entities"}]},{"id":"wqlSJ7eGGNQH1tvyz32H","title":"Secret Committees","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/contributors-and-entities/secret-committees","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"},{"label":"Contributors & Entities"}]},{"id":"fmj7vuKp5RtCszsQEKXA","title":"Support","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/contributors-and-entities/secret-committees/support","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"},{"label":"Contributors & Entities"},{"label":"Secret Committees"}]},{"id":"uWqXFgSBHV1CbZj1d7jl","title":"Governance","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/contributors-and-entities/secret-committees/governance","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"},{"label":"Contributors & Entities"},{"label":"Secret Committees"}]},{"id":"wS1tZb0fq9iuHswXoMxc","title":"Secret Network Dictionary","pathname":"/secret-network-documentation/overview-ecosystem-and-technology/ecosystem-overview/secret-network-dictionary","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Overview, Ecosystem and Technology","emoji":"1f92b"},{"label":"Ecosystem Overview","emoji":"1f438"}]},{"id":"2NjP6ILbedN2ZqL0TJsU","title":"Use SecretCLI","pathname":"/secret-network-documentation/infrastructure/secret-cli","siteSpaceId":"sitesp_pEM6o","emoji":"1f513","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"}]},{"id":"9MFlgqzNGmVeSYvT8oMY","title":"Secretcli vs. Secretd","pathname":"/secret-network-documentation/infrastructure/secret-cli/secretcli-vs.-secretd","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"UfAFEp8c9WJuVjpNgmuV","title":"Install","pathname":"/secret-network-documentation/infrastructure/secret-cli/install","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"e9I62LItsmcKcjVQgLFE","title":"Configuration","pathname":"/secret-network-documentation/infrastructure/secret-cli/configuration","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"b5qF21Al2HYJth1bUBPm","title":"Address Types","pathname":"/secret-network-documentation/infrastructure/secret-cli/address-types","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"GCPg6F8U5Ed6sMFcb78G","title":"Key Types","pathname":"/secret-network-documentation/infrastructure/secret-cli/key-types","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"QPmSRFpgLz1Ihc4dOtDA","title":"Generating Keys","pathname":"/secret-network-documentation/infrastructure/secret-cli/generating-keys","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"WnBkq9wi6Xs7Q84dJMY8","title":"Viewing Keys","pathname":"/secret-network-documentation/infrastructure/secret-cli/viewing-keys","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"WnFUmWxUCWKdvcJCZuQa","title":"Query Transactions","pathname":"/secret-network-documentation/infrastructure/secret-cli/query-transactions","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"BrPbsSz7NgZT1yEkR46Z","title":"Send Tokens","pathname":"/secret-network-documentation/infrastructure/secret-cli/send-tokens","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"2el2mFOe2oJBQdOF9LqW","title":"Multisig Keys","pathname":"/secret-network-documentation/infrastructure/secret-cli/multisig-keys","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"9mgMIsStOoOXtk0f5i88","title":"Multisig Transactions","pathname":"/secret-network-documentation/infrastructure/secret-cli/multisig-transactions","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"zioPdIFzpVKImxAmJ0h3","title":"Transaction Broadcasting","pathname":"/secret-network-documentation/infrastructure/secret-cli/transaction-broadcasting","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"azrRH3dJvREfUZSj3r9P","title":"Fees & Gas","pathname":"/secret-network-documentation/infrastructure/secret-cli/fees-and-gas","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"Gbd4Pc9K43gphFgoijgg","title":"Fee Distribution","pathname":"/secret-network-documentation/infrastructure/secret-cli/fee-distribution","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"s0DrIMkAMQgFqZugQVjY","title":"Secret Contracts","pathname":"/secret-network-documentation/infrastructure/secret-cli/secret-contracts","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"nty3I4TBkNwoRza2GcUr","title":"Slashing","pathname":"/secret-network-documentation/infrastructure/secret-cli/slashing","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"bTYG34r1ZBheyhdHxqOy","title":"Minting","pathname":"/secret-network-documentation/infrastructure/secret-cli/minting","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"ogHxiNDhIcmHTtswFDaI","title":"Delegating","pathname":"/secret-network-documentation/infrastructure/secret-cli/delegating","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"hiUOXSrxxbW8lC01uT2l","title":"Restake","pathname":"/secret-network-documentation/infrastructure/secret-cli/restake","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"a2bRQ1mZ4zDu7zCkCAO7","title":"Nodes","pathname":"/secret-network-documentation/infrastructure/secret-cli/nodes","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"KA2wKbePx0bISQRSpXuI","title":"Governance","pathname":"/secret-network-documentation/infrastructure/secret-cli/governance","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"}]},{"id":"6tJvF3VtJooadJRdcgb3","title":"Creating Governance Proposals","pathname":"/secret-network-documentation/infrastructure/secret-cli/governance/creating-governance-proposals","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"},{"label":"Governance"}]},{"id":"MBV7a5e6RzON1RwlHKwU","title":"Query Proposals","pathname":"/secret-network-documentation/infrastructure/secret-cli/governance/query-proposals","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"},{"label":"Governance"}]},{"id":"mOmSBKlLgvmqIAuaWrhv","title":"Deposits","pathname":"/secret-network-documentation/infrastructure/secret-cli/governance/deposits","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"},{"label":"Governance"}]},{"id":"YrcHL27tgfhsIiqmkbkg","title":"Voting","pathname":"/secret-network-documentation/infrastructure/secret-cli/governance/voting","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use SecretCLI","emoji":"1f513"},{"label":"Governance"}]},{"id":"vzTZ6sfOQaTAElLrquZt","title":"Use Ledger hardware wallet","pathname":"/secret-network-documentation/infrastructure/ledger","siteSpaceId":"sitesp_pEM6o","emoji":"1f510","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"}]},{"id":"9klsuUePQEFXP8vezRua","title":"Ledger with SecretCLI","pathname":"/secret-network-documentation/infrastructure/ledger/ledger","siteSpaceId":"sitesp_pEM6o","emoji":"1f510","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Use Ledger hardware wallet","emoji":"1f510"}]},{"id":"05ebSZj2XvhFENU5SvP7","title":"Infrastructure Services","pathname":"/secret-network-documentation/infrastructure/infrastructure-services","siteSpaceId":"sitesp_pEM6o","emoji":"1f6e0","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"}]},{"id":"y77KHzbUC1jM1PCEkt31","title":"PCCS Server","pathname":"/secret-network-documentation/infrastructure/infrastructure-services/pccs-server","siteSpaceId":"sitesp_pEM6o","icon":"server","description":"Installing and running a PCCS server","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Infrastructure Services","emoji":"1f6e0"}]},{"id":"IdrzMSCUO4kLOXOW4AtP","title":"Automatic Regstration Server","pathname":"/secret-network-documentation/infrastructure/infrastructure-services/automatic-regstration-server","siteSpaceId":"sitesp_pEM6o","emoji":"1f4dd","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Infrastructure Services","emoji":"1f6e0"}]},{"id":"IKFrdmCo7fnXv1NtFp9k","title":"Seed Server (only for Seed Rotation)","pathname":"/secret-network-documentation/infrastructure/infrastructure-services/seed-server-only-for-seed-rotation","siteSpaceId":"sitesp_pEM6o","emoji":"1f331","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Infrastructure Services","emoji":"1f6e0"}]},{"id":"T41IAHVvmTSLMimytspi","title":"Running a node/validator","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator","siteSpaceId":"sitesp_pEM6o","emoji":"1f5a5","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"}]},{"id":"BPfwAk6jeLSdNOL7flMa","title":"Setting up a node/validator","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator","siteSpaceId":"sitesp_pEM6o","description":"Everything that you need to setup a validator from picking the right hardware to getting a validator up and running.","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"}]},{"id":"AXmmTihev3pYXNOVdPIy","title":"Semi-Permissioned Model","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/semi-permissioned-model","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"}]},{"id":"uLlBXF8mQd8x8iWvIpAE","title":"Hardware setup","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/hardware-setup","siteSpaceId":"sitesp_pEM6o","description":"This chapter gives you an insight of what you need to run a node in Secret Network. Since Secret Network uses Intel SGX, nodes have to fulfill special requirements.","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"}]},{"id":"MP6ngO22FYjJAXEayJPX","title":"Hardware Compliance","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/hardware-setup/hardware-compliance","siteSpaceId":"sitesp_pEM6o","description":"This is intended to guide you in selecting SGX compliant hardware for Secret Network.","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Hardware setup"}]},{"id":"AhzGnLcpkQogVupVOBNS","title":"VPS/Bare-Metal Compliance","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/hardware-setup/vps-compliance","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Hardware setup"}]},{"id":"nDrykcOAIMdrDuwYBHG3","title":"Leaseweb Setup","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/hardware-setup/vps-compliance/leaseweb-setup","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Hardware setup"},{"label":"VPS/Bare-Metal Compliance"}]},{"id":"Cl4RDbkThONhrAr21QMk","title":"PhoenixNAP Setup","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/hardware-setup/vps-compliance/phoenixnap-setup","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Hardware setup"},{"label":"VPS/Bare-Metal Compliance"}]},{"id":"Aa1tKttERgPaV7VqgP1e","title":"Psychz Setup","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/hardware-setup/vps-compliance/psychz-setup","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Hardware setup"},{"label":"VPS/Bare-Metal Compliance"}]},{"id":"YvpRKDOmVrfLjTq93xvJ","title":"nForce Setup","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/hardware-setup/vps-compliance/nforce-setup","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Hardware setup"},{"label":"VPS/Bare-Metal Compliance"}]},{"id":"Ewd68IzCO1g7UeJvJgDt","title":"Vultr Setup","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/hardware-setup/vps-compliance/vultr-setup","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Hardware setup"},{"label":"VPS/Bare-Metal Compliance"}]},{"id":"3h3tj8BKRT8wuYQSyFQv","title":"OVHCloud Setup","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/hardware-setup/vps-compliance/ovhcloud-setup","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Hardware setup"},{"label":"VPS/Bare-Metal Compliance"}]},{"id":"EiXapfJ0fyxzsedOHexY","title":"Microsoft Azure Setup","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/hardware-setup/vps-compliance/microsoft-azure-setup","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Hardware setup"},{"label":"VPS/Bare-Metal Compliance"}]},{"id":"7vpE8BqbuTSaVkmbaLRB","title":"Patching your Node","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/hardware-setup/patching-your-node","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Hardware setup"}]},{"id":"H11Ypxzq9MjDdsXviG0I","title":"Extracting and Registering MachineID","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/hardware-setup/extracting-and-registering-machineid","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Hardware setup"}]},{"id":"gLkkvhxKDn0mrRuvnDb9","title":"Enclave verification","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/hardware-setup/enclave-verification","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Hardware setup"}]},{"id":"qbAYFXleCBMXQGpik0uR","title":"Registration troubleshooting","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/hardware-setup/registration-troubleshooting","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Hardware setup"}]},{"id":"7RTaLSXf0wwKIs9g21BI","title":"Testnet Setup","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/testnet","siteSpaceId":"sitesp_pEM6o","description":"This section will take you through the process of taking a node from fresh machine to full validator on the public testnet pulsar-3.","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"}]},{"id":"GZhqM43XtEdKLR4S44BM","title":"Install SGX","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/testnet/install-sgx-1","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Testnet Setup"}]},{"id":"goVIsFUFoDuCcgxBIagQ","title":"Install secretd","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/testnet/install-secretd","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Testnet Setup"}]},{"id":"gJUH0cP5L3ACYa0136zs","title":"Setup Full Node","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/testnet/run-a-full-node","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Testnet Setup"}]},{"id":"5RHAEpcjgVVtovqUAw4s","title":"Testnet State Sync","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/testnet/testnet-state-sync","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Testnet Setup"}]},{"id":"GX2kTRVc42HFwr7xVUSA","title":"Becoming a Testnet Validator","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/testnet/join-as-a-validator","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Testnet Setup"}]},{"id":"cC2xldzMFXqGi90lmj4n","title":"Installing CLI & Creating A New Address","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/testnet/installing-cli-and-creating-a-new-address","siteSpaceId":"sitesp_pEM6o","description":"`secretcli` is the Secret Network light client, a command-line interface tool for interacting with nodes running on the Secret Network. To install it, follow these instructions:","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Testnet Setup"}]},{"id":"pgCnJHqhh2zMlmwHkttH","title":"Mainnet Setup","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/node-setup","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"}]},{"id":"9KH6IeiPOP0CQMlCkoQh","title":"Install SGX","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/node-setup/install-sgx-1","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Mainnet Setup"}]},{"id":"afGsLuQNB40pMBA7Wn3P","title":"Install secretd","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/node-setup/install-secretd","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Mainnet Setup"}]},{"id":"mDqFTqm3TwG7h8FrH3mi","title":"Setup Full Node","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/node-setup/setup-full-node","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Mainnet Setup"}]},{"id":"Jkgz9MihYEuBRb15wt86","title":"Quicksync / Snapshot","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/node-setup/snapshot","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Mainnet Setup"}]},{"id":"fJjzkKfcof5NJZcUfogU","title":"Statesync","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/node-setup/state-sync","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Mainnet Setup"}]},{"id":"8NqPTyuGuBDjrg0wMeVT","title":"Becoming A Validator","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/node-setup/becoming-a-validator","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Mainnet Setup"}]},{"id":"QCMYALymxprfoYRZ7P8a","title":"Installing CLI & Creating A New Address","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/setting-up-a-node-validator/node-setup/installing-cli-and-creating-a-new-address","siteSpaceId":"sitesp_pEM6o","description":"`secretcli` is the Secret Network light client, a command-line interface tool for interacting with nodes running on the Secret Network. To install it, follow these instructions:","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Setting up a node/validator"},{"label":"Mainnet Setup"}]},{"id":"nXK2QdzphDPjUX0aplnN","title":"Maintaining a node/validator","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"}]},{"id":"0fhJFAMEtoPgevt6zIEc","title":"Slashing information","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-runners","siteSpaceId":"sitesp_pEM6o","description":"Overview","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"}]},{"id":"mi5Zzql2NpIpIQQEiaF4","title":"Migrating a Validator","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/migrating-a-validator","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"}]},{"id":"QjFvFcZZxJ2siHg98Pbk","title":"Troubleshooting","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/troubleshooting","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"}]},{"id":"1JJiq5HvCNwwMOa9JuYU","title":"Validator Backup","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/validator-backup","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"}]},{"id":"zZvQAWIB5UFw4Nv9CQFd","title":"Server security","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/security","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"}]},{"id":"9JQEXrs5GGxoGn9KRM83","title":"SSH authentication","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/security/ssh-authentication","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Server security"}]},{"id":"ajm83I4EeyBTPFaiyRyi","title":"Server configuration","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/security/server-configuration","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Server security"}]},{"id":"3fnSNmILYJsfR6bQEPEY","title":"Uncomplicated-Firewall (UFW)","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/security/uncomplicated-firewall-ufw","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Server security"}]},{"id":"L5veyxNVI2saYdD0ybiG","title":"Local CLI","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/security/local-cli","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Server security"}]},{"id":"u89iK4pEPnjb3pWO0qiI","title":"Node Monitoring","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"}]},{"id":"LkfF0gBOwkHlt0HLLOZZ","title":"Prometheus","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/prometheus","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"}]},{"id":"GMxwXcA5q4UfSIYs8g6o","title":"Environment Preperation","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/prometheus/environment-preperation","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"},{"label":"Prometheus"}]},{"id":"0KpVjQTXMkNMZUFZJUGe","title":"Install Node Exporter","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/prometheus/install-node-exporter","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"},{"label":"Prometheus"}]},{"id":"huSON4UBTkksPyTQCFFK","title":"Install Prometheus","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/prometheus/install-prometheus","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"},{"label":"Prometheus"}]},{"id":"YBAQ8kusEA1uiiyZw17C","title":"Configuring Prometheus","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/prometheus/configuring-prometheus","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"},{"label":"Prometheus"}]},{"id":"BkpCeEVnrGLzXbgmfkgi","title":"Grafana","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/grafana","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"}]},{"id":"66KfBkrfiQxJZwNjWN4l","title":"Install Grafana","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/grafana/install-grafana","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"},{"label":"Grafana"}]},{"id":"Z1heLPWDJjSA6r14qWl7","title":"Grafana Dashboard","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/grafana/grafana-dashboard","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"},{"label":"Grafana"}]},{"id":"JYmhgHLayAfgQhWDKmZ1","title":"Next Steps","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/grafana/next-steps","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"},{"label":"Grafana"}]},{"id":"qfAN0DmUEoq0mKqZpQbE","title":"Docker","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/docker","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"}]},{"id":"5Itc53yhyWENC9PoNfML","title":"Install Docker","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/docker/install-docker","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"},{"label":"Docker"}]},{"id":"hczoTXr8AbhLxJ6Mmo61","title":"Configuration","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/docker/configuration","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"},{"label":"Docker"}]},{"id":"sLswXBIR7SZd4PGtX0I0","title":"Start Containers","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/docker/start-containers","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"},{"label":"Docker"}]},{"id":"L90k220dnx00jJltzy5n","title":"Grafana Dashboard","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/docker/grafana-dashboard","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"},{"label":"Docker"}]},{"id":"ImF9IYqJB7wKr79rOkhS","title":"Application Ports","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/docker/application-ports","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"},{"label":"Docker"}]},{"id":"91IKdCiMXa65NM7qOc8R","title":"Stop Containers","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/docker/stop-containers","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"},{"label":"Docker"}]},{"id":"syY0xyvbeS3Bdg8jUbmH","title":"Goaccess","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/goaccess","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"}]},{"id":"bs5DZLGxeaKo3BSqCyuk","title":"Install Goaccess","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/goaccess/install-goaccess","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"},{"label":"Goaccess"}]},{"id":"lSGGQUKQMVM1pxirLvqE","title":"Setup Goaccess","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/node-monitoring/goaccess/setup-goaccess","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Node Monitoring"},{"label":"Goaccess"}]},{"id":"7xetX6oPaqjLoZ0LZnqc","title":"Helpful commands","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/delegation","siteSpaceId":"sitesp_pEM6o","description":"General Overview","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"}]},{"id":"BjnM90ZlGpzPSmG2Gnme","title":"Query Validators","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/delegation/query-validators","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Helpful commands"}]},{"id":"kMONfXPutnabH8yJV8Ac","title":"Bond Tokens","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/delegation/bond-tokens","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Helpful commands"}]},{"id":"qqyXLfCjnHBXGBLMja2k","title":"Withdraw Rewards","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/delegation/withdraw-rewards","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Helpful commands"}]},{"id":"i0afDWG5BnOQuepOJ5gU","title":"Query Delegations","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/delegation/query-delegations","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Helpful commands"}]},{"id":"T2tA2G8eKhIaLiEfs4W8","title":"Unbond Tokens","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/delegation/unbond-tokens","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Helpful commands"}]},{"id":"NWYAAZFORCPMRlPJeg7k","title":"Query Unbonding-Delegations","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/delegation/query-unbonding-delegations","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Helpful commands"}]},{"id":"0MYGqDMZ5FW2wXddSZ42","title":"Redelegate Tokens","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/delegation/redelegate-tokens","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Helpful commands"}]},{"id":"1YHaImeEAEdxU8J79YNB","title":"Query Redelegations","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/delegation/query-redelegations","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Helpful commands"}]},{"id":"bId4k76OkwDZIRQiofWd","title":"Query Parameters","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/delegation/query-parameters","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Helpful commands"}]},{"id":"XEGkoigjIGHSjTfFjB1e","title":"Query Pool","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/delegation/query-pool","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Helpful commands"}]},{"id":"vDi68F8L242hyJnCNLrR","title":"Query Delegations To Validator","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/maintaining-a-node-validator/delegation/query-delegations-to-validator","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Maintaining a node/validator"},{"label":"Helpful commands"}]},{"id":"Fxoyb6HDES4fZKaNYM8N","title":"API Noderunning","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/api-noderunning","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"}]},{"id":"0xEZmyWs0Zb9Sng6drOJ","title":"Running Multiple Nodes on the Same Server","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/api-noderunning/running-multiple-nodes-on-the-same-server","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"API Noderunning"}]},{"id":"XCn5VpQiQd6Q71dPCsde","title":"Node Loadbalancing using Nginx","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/api-noderunning/node-loadbalancing-using-nginx","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"API Noderunning"}]},{"id":"igoBKOzfgX0TQoWd35S0","title":"Setup Nginx","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/api-noderunning/node-loadbalancing-using-nginx/setup-nginx","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"API Noderunning"},{"label":"Node Loadbalancing using Nginx"}]},{"id":"ooHlyeea6oLuPmM6Oas5","title":"Example Nginx config","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/api-noderunning/node-loadbalancing-using-nginx/example-nginx-config","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"API Noderunning"},{"label":"Node Loadbalancing using Nginx"}]},{"id":"1EYBUcNxY5qTm67zXRlQ","title":"Using Auto heal to improve cluster uptime for Nginx","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/api-noderunning/using-auto-heal-to-improve-cluster-uptime-for-nginx","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"API Noderunning"}]},{"id":"i1WyYykK9ChmVoMYJVd9","title":"Sentry and Archive nodes","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/sentry-archive-and-ibc-node-setup","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"}]},{"id":"tRvvmGh13oyoowf3Ebn4","title":"Mantlemint","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/sentry-archive-and-ibc-node-setup/mantlemint","siteSpaceId":"sitesp_pEM6o","description":"Note: Mantlemint is currently in beta. This means some of these instructions may not work as expected, or could be subject to change","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Sentry and Archive nodes"}]},{"id":"DBm26h2ufX1sIVfVY9ay","title":"Sentry Nodes","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/sentry-archive-and-ibc-node-setup/sentry-nodes","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Sentry and Archive nodes"}]},{"id":"qCOUfcgzhWauhUE1yb4g","title":"Archive Nodes","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/sentry-archive-and-ibc-node-setup/archive-nodes","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"},{"label":"Sentry and Archive nodes"}]},{"id":"3hGkyfNIlhPoL1wFJ5bx","title":"Adding Nodes via Governance Proposal","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/adding-nodes-via-governance-proposal","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"}]},{"id":"0eLzbc6i33aCKDFG5tyu","title":"Adding an Azure node","pathname":"/secret-network-documentation/infrastructure/running-a-node-validator/adding-an-azure-node","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Running a node/validator","emoji":"1f5a5"}]},{"id":"6pZSGavsmD2tP1BMXCKF","title":"IBC Relayers","pathname":"/secret-network-documentation/infrastructure/ibc-relayers","siteSpaceId":"sitesp_pEM6o","emoji":"26d3","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"}]},{"id":"z6vLnaIpHxhLVItLoxCk","title":"Hermes","pathname":"/secret-network-documentation/infrastructure/ibc-relayers/hermes","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"IBC Relayers","emoji":"26d3"}]},{"id":"exJOeu3vL1RdYDBRRIhw","title":"RLY","pathname":"/secret-network-documentation/infrastructure/ibc-relayers/rly","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"IBC Relayers","emoji":"26d3"}]},{"id":"8wxAkT7SnNOnex5uxDo6","title":"IBC channel database","pathname":"/secret-network-documentation/infrastructure/ibc-relayers/ibc-channel-database","siteSpaceId":"sitesp_pEM6o","description":"All Chains and their respective IBC channels with Secret Network are listed below","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"IBC Relayers","emoji":"26d3"}]},{"id":"s5CRmAi0sTlWKgWhh0ww","title":"Upgrade Instructions","pathname":"/secret-network-documentation/infrastructure/upgrade-instructions","siteSpaceId":"sitesp_pEM6o","emoji":"1f199","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"}]},{"id":"tBXHATn1VnLakOuDJClm","title":"v1.13","pathname":"/secret-network-documentation/infrastructure/upgrade-instructions/v1.12","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Upgrade Instructions","emoji":"1f199"}]},{"id":"5Moqs4zdwzUjAWJhtRq6","title":"v1.12","pathname":"/secret-network-documentation/infrastructure/upgrade-instructions/v1.12-1","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Upgrade Instructions","emoji":"1f199"}]},{"id":"DAKpV8vpe2zqRsoZPmHm","title":"v1.11","pathname":"/secret-network-documentation/infrastructure/upgrade-instructions/v1.11","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Upgrade Instructions","emoji":"1f199"}]},{"id":"DKesPc3Ypr1flhyy20mE","title":"v1.10","pathname":"/secret-network-documentation/infrastructure/upgrade-instructions/v1.10","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Upgrade Instructions","emoji":"1f199"}]},{"id":"Rhhn61rhQVROwmThcVmg","title":"v1.9","pathname":"/secret-network-documentation/infrastructure/upgrade-instructions/v1.9","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Upgrade Instructions","emoji":"1f199"}]},{"id":"k8PZEunKsETqnnkz24PG","title":"v1.8","pathname":"/secret-network-documentation/infrastructure/upgrade-instructions/v1.8","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Upgrade Instructions","emoji":"1f199"}]},{"id":"DhkRZ5o7W2PD5dBq4srq","title":"v1.7","pathname":"/secret-network-documentation/infrastructure/upgrade-instructions/v1.7","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Upgrade Instructions","emoji":"1f199"}]},{"id":"gxbQtsd1fcHmQpIKtyWt","title":"Shockwave Omega v1.6","pathname":"/secret-network-documentation/infrastructure/upgrade-instructions/shockwave-omega","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Upgrade Instructions","emoji":"1f199"}]},{"id":"Zgwokt8L30EayNSJnMno","title":"v1.5","pathname":"/secret-network-documentation/infrastructure/upgrade-instructions/v1.5","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Upgrade Instructions","emoji":"1f199"}]},{"id":"eSfzBeDmW2pc5ekfABuu","title":"Shockwave Delta v1.4","pathname":"/secret-network-documentation/infrastructure/upgrade-instructions/shockwave-delta","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Upgrade Instructions","emoji":"1f199"}]},{"id":"S8e8zg6vXojFXmnmQa9v","title":"Shockwave Delta v1.4 (Testnet)","pathname":"/secret-network-documentation/infrastructure/upgrade-instructions/shockwave-delta-testnet","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Upgrade Instructions","emoji":"1f199"}]},{"id":"BrfnFUseNopeOcok5d1P","title":"Shockwave Alpha v1.3","pathname":"/secret-network-documentation/infrastructure/upgrade-instructions/shockwave-alpha","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Upgrade Instructions","emoji":"1f199"}]},{"id":"nhaaMi64NiDHBbcVTkkN","title":"Cosmovisor","pathname":"/secret-network-documentation/infrastructure/upgrade-instructions/cosmovisor","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Upgrade Instructions","emoji":"1f199"}]},{"id":"RlGidH3OBeHdwb4D1cd2","title":"Vulcan Network Upgrade (OLD)","pathname":"/secret-network-documentation/infrastructure/upgrade-instructions/vulcan-network-upgrade-old","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Upgrade Instructions","emoji":"1f199"}]},{"id":"b7Lmun6N8YDwYyIphjxp","title":"Postmortems","pathname":"/secret-network-documentation/infrastructure/post-mortems-upgrades","siteSpaceId":"sitesp_pEM6o","emoji":"2620","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"}]},{"id":"Of2Hsc29RHkv0PbxuiMX","title":"SNIP-20 leaks","pathname":"/secret-network-documentation/infrastructure/post-mortems-upgrades/snip-20-leaks","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Postmortems","emoji":"2620"}]},{"id":"ix7ODgba5O8MIPNEP1vr","title":"xApic","pathname":"/secret-network-documentation/infrastructure/post-mortems-upgrades/xapic","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Postmortems","emoji":"2620"}]},{"id":"mpZr6mIRrQlJy8gz3wYX","title":"Secpk-Verifications Bloat","pathname":"/secret-network-documentation/infrastructure/post-mortems-upgrades/secpk-verifications-bloat","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Postmortems","emoji":"2620"}]},{"id":"pC7Y8pci04UaRQxk8e2f","title":"Earn Contract Exploit","pathname":"/secret-network-documentation/infrastructure/post-mortems-upgrades/earn-contract-exploit","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Postmortems","emoji":"2620"}]},{"id":"sBE0u4LFgXMEDqO5jKsD","title":"Testnet Halt 95","pathname":"/secret-network-documentation/infrastructure/post-mortems-upgrades/testnet-halt-95","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Postmortems","emoji":"2620"}]},{"id":"JysY7cxqfQzGVOlPNplZ","title":"Contribute to the documentation","pathname":"/secret-network-documentation/infrastructure/how-to-contribute","siteSpaceId":"sitesp_pEM6o","emoji":"270d","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"}]},{"id":"n0YOCoyHNHte1KhmLRQb","title":"Report Bugs","pathname":"/secret-network-documentation/infrastructure/how-to-contribute/report-bugs","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Contribute to the documentation","emoji":"270d"}]},{"id":"K3dzJ52JTfDZmcr561C6","title":"Suggest Enhancements","pathname":"/secret-network-documentation/infrastructure/how-to-contribute/suggest-enhancements","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Contribute to the documentation","emoji":"270d"}]},{"id":"Ic6cWKxvUJPxKyuYSC8D","title":"First Contribution Guide","pathname":"/secret-network-documentation/infrastructure/how-to-contribute/first-contribution-guide","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Contribute to the documentation","emoji":"270d"}]},{"id":"qaWaAfe3c6iesdUEGdkC","title":"Pull Request Templates","pathname":"/secret-network-documentation/infrastructure/how-to-contribute/pull-request-templates","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Contribute to the documentation","emoji":"270d"}]},{"id":"wPjSLrxG1EopSXGO2jz3","title":"Update Documentation","pathname":"/secret-network-documentation/infrastructure/how-to-contribute/pull-request-templates/update-documentation","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Contribute to the documentation","emoji":"270d"},{"label":"Pull Request Templates"}]},{"id":"udlmOYBOtlxhK3IX1Rht","title":"Bug Fix","pathname":"/secret-network-documentation/infrastructure/how-to-contribute/pull-request-templates/bug-fix","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Contribute to the documentation","emoji":"270d"},{"label":"Pull Request Templates"}]},{"id":"naTkUUn60nlQtAxByTRo","title":"Improve Performance","pathname":"/secret-network-documentation/infrastructure/how-to-contribute/pull-request-templates/improve-performance","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Contribute to the documentation","emoji":"270d"},{"label":"Pull Request Templates"}]},{"id":"rGmldfvYo9eYLyTqK01H","title":"Change Functionality","pathname":"/secret-network-documentation/infrastructure/how-to-contribute/pull-request-templates/change-functionality","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Contribute to the documentation","emoji":"270d"},{"label":"Pull Request Templates"}]},{"id":"W3V4NPcVjjTlcNGwDECd","title":"Style Guide","pathname":"/secret-network-documentation/infrastructure/how-to-contribute/formatting-guide","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Contribute to the documentation","emoji":"270d"}]},{"id":"6tQMT22nQZQxonBYPt35","title":"Versioning & Changelog","pathname":"/secret-network-documentation/infrastructure/versioning-and-changelog","siteSpaceId":"sitesp_pEM6o","emoji":"1f30a","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"}]},{"id":"etGnwNRIWIHtGNT0PjHd","title":"Secret Network v1.13","pathname":"/secret-network-documentation/infrastructure/versioning-and-changelog/secret-network-v1.13","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Versioning & Changelog","emoji":"1f30a"}]},{"id":"k7Z70cs8HaTYkD2n3bZn","title":"Secret Network v1.12","pathname":"/secret-network-documentation/infrastructure/versioning-and-changelog/secret-network-v1.12","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Versioning & Changelog","emoji":"1f30a"}]},{"id":"RBTp3sfXRMvBWnaYsiV6","title":"Secret Network v1.11","pathname":"/secret-network-documentation/infrastructure/versioning-and-changelog/secret-network-v1.11","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Versioning & Changelog","emoji":"1f30a"}]},{"id":"QXdzV55ffjuDROyaBzWM","title":"Secret Network v1.10","pathname":"/secret-network-documentation/infrastructure/versioning-and-changelog/secret-network-v1.10","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Versioning & Changelog","emoji":"1f30a"}]},{"id":"tg3kTmxG7c2XjwOJUsKr","title":"Secret network v1.9","pathname":"/secret-network-documentation/infrastructure/versioning-and-changelog/secret-network-v1.9","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Versioning & Changelog","emoji":"1f30a"}]},{"id":"gkeMwzjjVSc1SHtIfhsa","title":"Secret Network v1.7/1.8","pathname":"/secret-network-documentation/infrastructure/versioning-and-changelog/secret-network-v1.7-wip","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Versioning & Changelog","emoji":"1f30a"}]},{"id":"x6zx4i97B3mDCDww3dbU","title":"Secret Network v1.6","pathname":"/secret-network-documentation/infrastructure/versioning-and-changelog/secret-network-v1.6","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Versioning & Changelog","emoji":"1f30a"}]},{"id":"fsZAabtZa9ClR6FxLYJP","title":"Secret Network v1.5","pathname":"/secret-network-documentation/infrastructure/versioning-and-changelog/secret-network-v1.5-placeholder","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Versioning & Changelog","emoji":"1f30a"}]},{"id":"coI5HoQV6NkbQqDLMTYS","title":"Secret Network v1.4 (CosmWasm 1.0)","pathname":"/secret-network-documentation/infrastructure/versioning-and-changelog/migration-from-cw-0.10-to-1.0","siteSpaceId":"sitesp_pEM6o","description":"","breadcrumbs":[{"label":"Infrastructure","emoji":"1f527"},{"label":"Versioning & Changelog","emoji":"1f30a"}]},{"id":"AAGLEfBhP6pO0zYw9Xtn","title":"Cron module","pathname":"/secret-network-documentation/cron-module","siteSpaceId":"sitesp_pEM6o","emoji":"23f0"},{"id":"HZcM8TAsPtP0g9mMwMIg","title":"Overview","pathname":"/secret-network-documentation/cron-module/overview","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Cron module","emoji":"23f0"}]},{"id":"JXa4GChk090Nskl8tgLP","title":"Client","pathname":"/secret-network-documentation/cron-module/client","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Cron module","emoji":"23f0"}]},{"id":"Ifme4RTScrOXL3AEnYXl","title":"State","pathname":"/secret-network-documentation/cron-module/state","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Cron module","emoji":"23f0"}]},{"id":"QPh3TkW1Sght1xVmlKAx","title":"Metrics","pathname":"/secret-network-documentation/cron-module/metrics","siteSpaceId":"sitesp_pEM6o","breadcrumbs":[{"label":"Cron module","emoji":"23f0"}]}]}