
Security is a continuous process for Levr Bet, and we believe transparency is part of earning trust. As we approach launch, we’ve completed multiple independent security audits across the Levr Bet smart contract system, remediated confirmed issues, and documented outcomes.
This post summarizes the audits we’ve completed, how we categorize fixes vs. acknowledgements, and what we’re doing next.
Different auditors and different methodologies catch different classes of risk, business logic bugs, edge-case settlement failures, denial-of-service vectors, access control mistakes, and integration hazards. No audit can guarantee the absence of bugs, so our approach is layered:
We engaged 0xWeiss through Hyacinth Audits (https://www.hyacinthaudits.xyz/). 0xWeiss is an independent security researcher specializing in smart contract auditing with 4+ years in the auditing space and experience helping secure DeFi protocols.
The engagement ran over multiple weeks and focused on practical exploit paths and protocol safety across core mechanics.
Vulnerability summary:
Octane performed an analysis using automated techniques paired with team feedback and triage.
Summary of findings:
Octane identified 13 issues, with 13/13 confirmed, and recorded outcomes as resolved or acknowledged.
Severity breakdown:
The report also highlights areas where the current architecture relies on explicit operational assumptions (for example, what is enforced by an off-chain orderbook component vs. what is enforced on-chain). Those items are tracked as acknowledged, with a clear direction to migrate more validation on-chain in future iterations.
In audit reports, “Acknowledged” does not mean “ignored.” It usually means one of the following:
We track acknowledged items explicitly because they’re part of being honest about the system’s current assumptions.
Across these security audits, remediation work focused on: