(1) Each node is untrusted and is run by a malicious host
(2) Each node is equipped with a secure enclave (SGX) that can execute code/data in a trusted manner such that the data cannot be observed or manipulated by the host
(3) Assumed PKI (Public Key Infrastructure) and cryptographic primitives are secure (signatures, encryption, etc.)
(4) Assumed there is shared consensus in the Secret Network
Here is a list of compiled theoretical attacks:
(1) Deanonymizing with ciphertext byte count