I have a set of Solana-based smart contracts written in Rust that power a token-issuance module. Before we push the mint live, I want fresh eyes on both the contracts themselves and the surrounding codebase. The goal is two-fold: a comprehensive, line-by-line security audit that highlights any design-level weaknesses, plus a targeted investigation into a handful of edge-case scenarios I’m already concerned about. You’ll be digging into Anchor-framework programs, on-chain and off-chain helpers, SPL-token interactions, and the deployment scripts. A deep familiarity with Solana runtime quirks, Rust unsafe patterns, re-entrancy vectors and CPI-related pitfalls will be invaluable. Deliverables I expect: • A detailed audit report outlining every discovered vulnerability, classified by severity and likelihood • Concrete remediation advice or patch code where applicable • A final verification pass once fixes are applied, confirming that previously flagged issues are resolved If you use static-analysis tools (e.g., Sealevel Static, Soteria) alongside manual review and fuzzing, please mention that in your proposal. Turnaround time is flexible—quality and thoroughness matter most.