paper icon

SECURITY & AUDITS: SECURITY YOU CAN VERIFY

AUDD is built on independently audited smart contracts, institutional-grade infrastructure, and robust operational controls.

Security is embedded across every layer of AUDD – from contract design to issuance, custody, and ongoing monitoring.

SECURITY SNAPSHOT

AUDD Security Status:

  • Independently audited smart contracts across Ethereum ERC-20, Solana, and Hedera
  • No critical or high-severity vulnerabilities were identified across the audited contracts
  • All identified findings were remediated and independently retested before deployment
  • Built in alignment with recognised global security standards (OWASP, NIST, SCSVS)
  • Ongoing audit and review processes are applied to all contract updates.

Independent Smart Contract Audits:

AUDD smart contracts undergo independent third-party security audits before deployment.

Audits are conducted using a combination of: 

  • Static analysis
  • Dynamic testing
  • Manual code review.
Assessments are aligned to globally recognised frameworks, including:
  • OWASP
  • NIST SP 800
  • Smart Contract Security Verification Standard (SCSVS)
  • DASP Top 10

All audit findings are reviewed, remediated, and re-tested before production deployment.

audit coverage

Network
Ethereum (ERC-20)
Solana (Rust)
Hedera

Contract Type
Core Token Contract
Contract Program
Token Contract

Audit Date
August 2023
February 2024
April 2025

Status
Secure
Secure
Secure

AUDIT CERTIFICATES

Certificates provide a high-level confirmation that AUDD smart contracts have undergone an independent audit and meet recognised security standards.

They are supported by full technical audit reports available below.

Ethereum (ERC-20) [View Certificate]

Solana (Rust) [View Certificate]

Hedera [View Certificate]

FULL AUDIT REPORTS

Full audit reports are provided for transparency and independent verification.

Each report includes:

  • Scope of audit
  • Methodology and tools used
  • Detailed findings and severity classification
  • Remediation actions and re-testing outcomes

Ethereum (ERC-20) [Download Full Audit Report]

Solana (Rust) [Download Full Audit Report]

Hedera [Download Full Audit Report]

MULTI CHAIN ARCHITECTURE

AUDD is deployed across multiple blockchain networks, each with differing technical architectures.

Non-Smart Contract Networks

On networks such as Stellar and XRPL, AUDD is issued using native protocol-level asset functionality rather than custom smart contracts.

These environments rely on:

  • Built-in asset issuance mechanisms
  • Native permissioning controls
  • Network-level validation and security

As a result, smart contract-specific risks are not present in the same form as EVM-based environments.

EVM-Compatible Networks

Across EVM-compatible networks, AUDD utilises a consistent smart contract framework.

Where identical audited code is deployed:

  • The original audit findings apply across those deployments
  • No material changes have been made to contract logic
  • Contract behaviour remains consistent across networks

This includes deployments on:

  • Base
  • XDC Network
  • Redbelly Network

Any material changes to contract logic are subject to independent audit prior to deployment.

SECURITY APPROACH

AUDD is supported by a robust security framework designed for institutional use.

Smart Contract Security

  • Multi-layered audit methodology (static, dynamic, manual review)
  • Upgradeable architecture with governance controls
  • Re-audits performed following contract updates

Infrastructure

  • Institutional-grade custody and key management (MPC)
  • Segregated client asset architecture
  • Continuous monitoring and threat detection

Operational Controls

  • Controlled minting and redemption processes
  • Multi-party approvals for critical actions
  • Reconciliation between on-chain supply and fiat reserves

Continuous Security Commitment

Security is an ongoing discipline.

AUDC maintains continuous improvement through:

  • Periodic re-audits
  • Internal security reviews
  • Monitoring of emerging threats and vulnerabilities
  • Alignment with evolving global standards
Responsible Disclosure
If you identify a potential vulnerability, please contact us via our form below