Methodology
How Solmate structures protocol reviews
The review library uses a repeatable research framework so protocols can be compared on structure, security history, external dependencies, and principal risk drivers.
Approach
Research principles
- Each review consolidates architecture, security history, governance surfaces, and operating dependencies into a common structure.
- Source materials may include protocol documentation, audit reports, governance references, issuer disclosures, and regulatory filings where relevant.
- Every note is written to make the factual basis for a view inspectable, with source links attached directly to the report.
- Published reviews are designed to accelerate diligence, not eliminate the need for deeper legal, technical, operational, or market analysis.
Sources
Material reviewed
- Protocol documentation, architecture references, and operating materials
- Security pages, audit reports, and public incident or disclosure histories where available
- Issuer, product, legal, or regulatory materials for tokenized-asset and RWA structures
- Supporting reference materials that help clarify governance, market structure, or integrations
Limits
What these reviews do not claim
- They do not replace code review, smart contract audit work, or transaction-level testing.
- They do not independently verify every third-party statement, reserve claim, or operational control.
- They do not eliminate governance, liquidity, legal, market, or counterparty risk.
- They do not constitute a recommendation, offer, or suitability determination.
Disclosure
Standard research disclosure
This report synthesizes publicly available materials to support diligence. It does not constitute a smart contract audit, legal advice, or an offer to transact. Security reviews, documentation, and public disclosures can improve transparency, but they do not eliminate implementation, governance, operational, custody, or market risk.