Solmate Research

Solmate Protocol Review Portal

A research library for protocols relevant to treasury deployment across Solana credit, yield, and tokenized asset infrastructure.

Framework

Architecture, security, and dependency review

Coverage

Curated protocol set with comparable writeups

Sources

Docs, audits, issuer materials, and disclosures

Current coverage

Published protocol reviews

Coverage is curated rather than exhaustive. Reviews are published where structure, strategic relevance, or operational complexity warrant a full writeup.

Solana

Kamino

Protocol Review

Lending / Managed Vaults

Kamino is a Solana DeFi platform spanning lending markets, managed yield vaults, leveraged strategies, and automated liquidity products. Public documentation presents Kamino as a multi-product protocol with curator-managed vault infrastructure and open developer tooling.

View Report

Solana

Solstice

Protocol Review

Stablecoin / Yield Vault

Solstice presents itself as a permissionless institutional-yield protocol on Solana centered on USX, a stable-backed stablecoin, and a YieldVault structure designed to provide tokenized access to delta-neutral yield strategies.

View Report

Solana

OnRe

Protocol Review

RWA / Reinsurance Yield

OnRe positions itself as an on-chain reinsurance company on Solana, offering tokenized access to reinsurance-linked yield through ONyc and related program infrastructure. Public materials emphasize regulated operating structures, composability, and contract-derived metrics.

View Report

Solana expansion / Figure ecosystem

Figure

Protocol Review

RWA / Tokenized Yield Instrument

Figure is framed around the public rollout of YLDS and Figure’s stated expansion of tokenized yield infrastructure toward Solana. Public materials describe YLDS as a fixed-price, interest-bearing, SEC-registered digital security associated with Figure Certificate Company, with Solana-related expansion announced publicly.

View Report

Methodology

A repeatable research format

Each note follows the same structure so readers can move quickly from protocol description to dependencies, security history, and key risk concentration.

View methodology
  • Each review consolidates architecture, security history, governance surfaces, and operating dependencies into a common structure.
  • Source materials may include protocol documentation, audit reports, governance references, issuer disclosures, and regulatory filings where relevant.
  • Every note is written to make the factual basis for a view inspectable, with source links attached directly to the report.
  • Published reviews are designed to accelerate diligence, not eliminate the need for deeper legal, technical, operational, or market analysis.