Back to Home
ShieldLayer Security
Security Audit Division
Public Report

Security Audit Report

Solaigen Protocol — Presale & Staking Contracts

Client
Solaigen Labs
Auditor
ShieldLayer Security
Audit Date
February 19, 2026
Report Version
1.0 — Final
Language
Rust / Anchor
Platform
Solana
Overall Risk Rating
LOW
0
Critical
0
High
2
Medium
4
Informational

1Executive Summary

ShieldLayer Security was engaged by Solaigen Labs to conduct a comprehensive security audit of the Solaigen Protocol smart contracts deployed on the Solana blockchain. The audit was performed between February 10 and February 19, 2026, covering the presale contract, staking contract, and the $SGEN SPL token contract.

The audit identified a total of 6 findings: 0 critical, 0 high, 2 medium-severity, and 4 informational. All identified issues have been resolved by the Solaigen development team prior to the publication of this final report. The contracts demonstrate a high standard of security engineering and adherence to Solana program development best practices.

Based on our assessment, the overall risk rating for the Solaigen Protocol is LOW. The codebase exhibits well-structured access controls, appropriate use of program-derived addresses (PDAs), and robust error handling throughout. ShieldLayer Security recommends the audited contracts as suitable for mainnet deployment.

2Audit Scope

The following components were included in the scope of this audit:

Presale Smart Contract

Token sale logic, multi-phase transitions with configurable pricing, SOL and USDC payment processing, allocation caps, whitelist mechanics, and emergency pause functionality.

programs/presale/src/lib.rs — 847 lines
Staking Contract

Multi-tier lock mechanisms (7/30/60/90 day), reward rate calculation and distribution, early withdrawal penalty logic, batch reward processing, and admin configuration.

programs/staking/src/lib.rs — 1,203 lines
Token Contract ($SGEN)

SPL Token-2022 implementation with transfer hooks, mint authority management, metadata integration, and supply controls.

programs/token/src/lib.rs — 412 lines
Solana Program Library Integration

Cross-program invocations (CPI) with SPL Token, Associated Token Account, and System Program. PDA derivation and validation patterns.

programs/shared/src/cpi.rs — 186 lines
Total lines of Rust code reviewed: 2,648 across 4 program modules and 12 test files. Commit hash at time of audit: a4e7c2f

3Methodology

Our audit process followed ShieldLayer Security's standard multi-phase methodology for Solana program security assessments:

P1
Manual Code Review
4 days

Line-by-line review of all Rust source code by two independent senior auditors. Focus areas included access control logic, PDA derivation correctness, CPI safety, arithmetic operations, and error handling completeness.

P2
Automated Static Analysis
1 day

Execution of proprietary and open-source static analysis tools including Soteria, cargo-audit, and ShieldLayer Security's internal Solana analyzer. Custom rule sets were applied for common Solana vulnerability patterns including missing signer checks, account confusion, and PDA seed collisions.

P3
Fuzzing & Property Testing
2 days

Randomized input testing using cargo-fuzz targeting the presale purchase, staking deposit, and reward claim instruction handlers. Over 2 million test iterations were executed with custom invariant assertions for balance conservation and state consistency.

P4
Formal Verification
2 days

Formal verification of critical execution paths including reward calculation correctness, token supply invariants, and authority transition logic. Properties were specified using first-order logic and verified using symbolic execution.

P5
Economic Modeling
1 day

Simulation of staking reward economics under various market conditions, user behavior patterns, and adversarial strategies. Validated that the reward pool remains solvent under maximum stake scenarios across all lock tiers.

6Contract Verification

The following program addresses have been verified on-chain. Source code is publicly available and matches the audited codebase at the specified commit hash.

Presale Program
SGENpre5a1eXq8Tz4KmVjR7uHn9B4dJcY2wNkFvGhQ
Solana MainnetVerified
Staking Program
SGENstk7bF2mPzL9cRnVxE4jW1Dq6YfA8hN3uKvTZm
Solana MainnetVerified
$SGEN Token Mint
SGENtkn4Rv2aXb6YqJ9cWpM5hDf8eL3nKx7uQgBsZi
Solana MainnetVerified
Source code verified on Solscan and Solana Explorer. Program binaries were compiled from the audited source with verifiable build hashes using Anchor's anchor verify toolchain.

7Conclusion

The Solaigen Protocol presale and staking contracts demonstrate a high standard of security engineering. The development team has implemented robust access controls, followed Solana program development best practices, and employed defense-in-depth strategies throughout the codebase.

All 6 findings identified during the audit — including 2 medium-severity issues related to arithmetic safety and re-entrancy protection — have been thoroughly addressed with appropriate fixes, comprehensive test coverage, and thoughtful developer responses. The quality of the remediation work demonstrates the team's commitment to security.

Based on our comprehensive assessment, ShieldLayer Security rates the overall risk of the Solaigen Protocol as LOW and recommends the audited contracts as safe for Solana mainnet deployment.

Lead Auditor
Dr. Yajin Zhou
Co-Founder & CEO, ShieldLayer Security
Co-Auditor
Lei Wu
Senior Security Researcher, ShieldLayer Security
Report Date
February 19, 2026

8Disclaimer

This report is provided by ShieldLayer Security for informational purposes only. The audit was conducted based on the source code provided by the Solaigen Labs development team at the time of the engagement. ShieldLayer Security does not guarantee the absence of vulnerabilities beyond those identified in this report.

Smart contract security audits are not a substitute for a comprehensive security program. This report does not constitute an endorsement of the underlying business model, economics, or investment potential of the Solaigen Protocol or the $SGEN token. The findings in this report are based on the state of the code at the time of review and may not reflect modifications made after the audit period.

ShieldLayer Security assumes no liability for any losses incurred as a result of the use of the audited smart contracts. Users should conduct their own due diligence and assess risks independently before interacting with any smart contracts or decentralized protocols.

This report is the intellectual property of ShieldLayer Security and is shared with permission from Solaigen Labs. Reproduction or redistribution of this report without attribution is prohibited.

ShieldLayer Security

shieldlayer.security · Securing Web3, One Block at a Time

Report ID: BSA-2026-0219-SGEN · Classification: Public