Methodology

How Solmate structures protocol reviews

The review library uses a repeatable research framework so protocols can be compared on structure, security history, external dependencies, and principal risk drivers.

Approach

Research principles

  • Each review consolidates architecture, security history, governance surfaces, and operating dependencies into a common structure.
  • Source materials may include protocol documentation, audit reports, governance references, issuer disclosures, and regulatory filings where relevant.
  • Every note is written to make the factual basis for a view inspectable, with source links attached directly to the report.
  • Published reviews are designed to accelerate diligence, not eliminate the need for deeper legal, technical, operational, or market analysis.

Sources

Material reviewed

  • Protocol documentation, architecture references, and operating materials
  • Security pages, audit reports, and public incident or disclosure histories where available
  • Issuer, product, legal, or regulatory materials for tokenized-asset and RWA structures
  • Supporting reference materials that help clarify governance, market structure, or integrations

Limits

What these reviews do not claim

  • They do not replace code review, smart contract audit work, or transaction-level testing.
  • They do not independently verify every third-party statement, reserve claim, or operational control.
  • They do not eliminate governance, liquidity, legal, market, or counterparty risk.
  • They do not constitute a recommendation, offer, or suitability determination.

Disclosure

Standard research disclosure

This report synthesizes publicly available materials to support diligence. It does not constitute a smart contract audit, legal advice, or an offer to transact. Security reviews, documentation, and public disclosures can improve transparency, but they do not eliminate implementation, governance, operational, custody, or market risk.