in your text you say
Knowing only data, H, and signature, the attacker's goal is to append 'append' to data and generate a valid signature for the new data. And that's easy to do! Let's see how.
but actually, you need the length of secret to calculate the length of padding?