Skip to main content

Audit Review Brief

Use this page when you are reviewing OmegaX as an audit firm, diligence reviewer, sponsor security team, or capital partner.

This page orients external reviewers to OmegaX Protocol. It is not a substitute for source review, but it helps reviewers find the protocol surface, SDK, public docs, trust boundaries, and known product limits.

Use the live docs for orientation. If a procurement workflow requires a PDF, export this page from the docs site so the review copy matches the public docs.

Scope

For formal review, OmegaX can provide a pinned public review package. These docs describe the current public integration surface.

A complete review package normally includes:

  • Onchain program: custody, reserve, claim, oracle, capital, governance, fee, and emergency-control transitions in the program source.
  • Protocol console and adapters: mounted operator, sponsor, capital, governance, oracle, schema, member, and claim surfaces in omegax-protocol/frontend.
  • Generated interface: IDL, shared contract artifacts, frontend generated artifacts, SDK bindings, and public docs must be compared against the same chosen protocol target. Start with the protocol IDL, shared contract, and SDK generated contract.
  • SDK: transaction builders, account readers, PDA helpers, safe wrappers, claim-intent validation, oracle attestation helpers, and protocol-local verification in omegax-sdk.
  • Public docs: user-facing claims, current product availability, and integration guidance in omegax-docs.
  • Genesis Protect workflows: the boundary between onchain state and staffed claim review. Use Genesis Claims Operations and Genesis Protect Availability.

Formal review should use exact commit hashes or commit-specific repository links. Branch names alone are not enough.

Current Interface

Use generated artifacts as the reference for counts and account shapes. The current public interface is summarized in Current Program Surface and should be rechecked against the pinned audit commits before final report delivery.

At this review level, the important facts are:

  • programs/omegax_protocol/src/lib.rs is the Anchor facade and IDL entrypoint.
  • Domain modules under programs/omegax_protocol/src/ are the implementation reference.
  • Checked-in generated artifacts live in idl/, shared/, frontend/lib/generated/, and omegax-sdk/src/generated/.
  • The current generated surface exposes 62 instructions, 31 accounts, and 122 generated types.

Architecture

OmegaX separates health workflow from settlement truth.

LayerWhat it doesWhat it should not hide
OmegaX HealthApp experience, event production, oracle workflow, and privacy-sensitive claim support.Economically material reserve or payout accounting.
Business ConsoleSponsor and operator configuration, monitoring, cohort support, and reporting.Settlement-critical state that should be replayable from protocol records.
OmegaX ProtocolDurable rights, liabilities, reserves, capital positions, attestations, controls, and settlement consequences on Solana.Raw medical records, private evidence packets, or local human workflow.

The protocol is reserve-domain-first. Tokens sit in configured domain vaults, while ledgers attribute reserve state across domain, plan, series, funding line, capital class, and allocation scopes. Health plans, policy series, funding lines, claim cases, obligations, liquidity pools, capital classes, and allocation positions are separate objects so sponsor money, member rights, oracle attestations, and LP capital do not collapse into one ambiguous pool.

Read Order

StepReadWhy it matters
1Current Program SurfacePublic boundary and instruction families.
2ArchitectureSystem map across app, operator, and protocol layers.
3Core ObjectsAccount-level mental model before reading handlers.
4Governance and SafetyEmergency controls, governance constraints, and safety posture.
5Genesis Claims OperationsClaim evidence, review, holds, disputes, and offchain boundary.
6SDK Overview and SDK API ReferenceIntegration surface, safe helpers, readers, and generated contract shape.

Security review materials are supplied with the audit package. They identify the source files, generated artifacts, SDK package, and public documentation target being reviewed.

Trust Boundaries

BoundaryCurrent modelReviewer focus
Onchain enforcementProgram checks authorities, custody transfers, reserve ledger updates, claim state, oracle attestations, redemptions, fees, and emergency controls.Missing signer checks, incorrect PDA seeds, unchecked token movement, ledger/account drift, arithmetic and state-transition bugs.
SDK safetySDK helpers bind builders and readers to the generated protocol surface and add client-side checks for safer integrations.Custom program ID handling, account owner checks, stale IDL/generated artifacts, unsafe bypasses, signer-intent mismatch, partial optional account scope.
Frontend/operator surfacesConsoles can help users prepare or review actions, but they should not be treated as the only enforcement layer.Any claim that frontend review is universal, mandatory, or a substitute for program constraints.
Claim evidenceRaw evidence and medical details stay offchain. The protocol anchors hashes, attestations, claim decisions, reserve booking, and settlement consequences.Metadata leakage, evidence-hash substitution, stale attestations, operator abuse paths, privacy-sensitive logs or exports.
Governance and rolesProtocol governance and operational roles are separated by configured authorities and bootstrap controls.Role collapse, missing multisig, unclear rotation, break-glass usage, broad hot-wallet blast radius.

Review Areas

AreaWhat can go wrong
Reserve custodyLedger balances increase without real token custody, wrong vault signer, settlement from an unintended mint, or reserve attribution becomes ambiguous.
Claim lifecycleClaimant spoofing, evidence replacement after attestation, wrong recipient routing, payout over approved amount, or offchain-only decisions with no replayable state.
Oracle and schema registryOracle spoofing, stale schema approval, wrong plan or pool binding, replayed attestations, or missing finality checks.
LP capital and redemptionsClients supply payout amounts instead of shares, queued redemptions bypass impairment, NAV math becomes inconsistent, or class restrictions are ignored.
Privileged rolesGovernance, claims, oracle, sponsor, curator, allocator, or sentinel authority collapses into one key or one undocumented operational path.
Generated artifactsIDL, generated TypeScript, SDK builders, public docs, and frontend adapters drift apart.
SDK integration layerSafe wrappers miss a reserve-moving path, account readers skip owner checks, claim-intent validation accepts the wrong signed transaction, or oracle-attestation helpers accept stale or wrong-context evidence.
Release matrixProtocol source, generated artifacts, SDK package, docs portal, and deployed cluster are reviewed as if they are one commit when they are actually different targets.
Public claimsDocs imply broad insurance availability, fully decentralized claims, unsupported reserve-productivity execution, or availability beyond the current bounded product posture.

Public Limits

OmegaX should be reviewed against the current public claims.

  • Public builder integrations target Solana devnet beta.
  • Genesis Protect Acute has limited, reserve-gated launch availability and is not broadly available insurance today.
  • Phase 0 claim review is staffed and AI-supported, not fully automated or fully decentralized.
  • Raw medical records and raw evidence packets stay offchain and out of public docs.
  • Posted reserve, collected premiums, explicit sponsor funds, LP allocations, and configured backstops matter; unposted demand and app membership fees do not become claims-paying reserve by themselves.
  • Reserve-productivity or yield execution is outside the public claim unless the public protocol interface exposes explicit instructions and policy.
  • Formal review is tied to a specific evidence package, not only a moving branch name.

Audit Package

Use this page first, then include:

ItemWhy
Exact commit hashes or commit-specific links for omegax-protocol, omegax-sdk, and omegax-docsFixes the review target.
Version matrix covering protocol commit, SDK package version or commit, docs commit, generated-artifact hashes, cluster, and program IDPrevents accidental review of mismatched surfaces.
Explicit audit scope and non-goalsPrevents reviewers from spending time on unsupported surfaces.
Any deployment, program ID, or cluster context that is public and intended for reviewLets reviewers distinguish the supported public cluster and review target.
Known open questions or areas where OmegaX wants extra adversarial focusProduces a better audit than a generic checklist.
Preferred report format, severity scale, disclosure process, and retest expectationsKeeps delivery operationally clean.

A PDF can be exported from this page for procurement, but the live docs page remains the easiest entrypoint for reviewers.

Next read