It's not a secret, the main exploit was disclosed in December when it was added to Kosmos to fix sleep mode on downgraded switches with fuses burned for a higher os version.
https://switchbrew.org/w/index.php?title=Switch_System_Flaws#Hardware
The Tegra X1 bootrom supports saving SDRAM parameters to scratch registers, and using the saved configuration to enable DRAM during warmboot.
The code that parses these parameters does if (params->EmcBctSpareN) *params->EmcBctSpareN = params->EmcBctSpareNPlusOne for most N, without validating either the address or value written to it. There are other arbitrary writes in this code, as well (e.g. BootromPatch parameters intended for patching MISC registers do not check a relative offset to 0x7000000, etc).
This allows a user with access to the PMC registers (via pre-sleep bpmp execution, or otherwise) to gain arbitrary bootrom code execution.
However there are other exploits that are necessary to be able to use this as an entry point and these are different on each OS version. An entire exploit chain has been released for 1.0.0 switches.
There were exploit chains for some newer OS versions (up to 4.x) that cannot be released at the moment because SciresM had a hard drive failure and he lost them & they would need to be re-implemented.
I don't know if anyone has actually implemented an exploit chain that works on newer OS, but they likely rely on exploits that haven't been patched by Nintendo. I think it's the arbitrary bootrom code execution that was fixed in 8.0.0, so no matter what other exploits are found won't lead to a successful chain.
If you don't get it then think here is an analogy. You may have an exploit that allows you to start any car but you might need a different exploit to open the door of a ford and a different one to open an nissan. Combining the ford car door opening exploit with the start any car exploit gives you an exploit chain for ford cars. While someone found out that the new Lambourghini is going to be using nissan door opening technology, so they are keeping the nissan exploit secret for now.