How Button Made Audits Boring cover image
How Button Made Smart Contract Audits Boring

TL;DR: By shifting security left with Octane, Button identified risks early, shipped cleaner code to auditors, avoided costly remediation cycles, and saved valuable engineering time. An Octane power user, Button also extended continuous automated security to its offchain Rust code.

Get new posts & updates straight to your inbox
By subscribing you agree to with our Privacy Policy.
Thank you for subscribing!
Oops! Something went wrong while submitting the form.
Screenshot of the UI of the Octane platform
Analyze your code

How Button Made Smart Contract Audits Boring

TL;DR: By shifting security left with Octane, Button identified risks early, shipped cleaner code to auditors, avoided costly remediation cycles, and saved valuable engineering time. An Octane power user, Button also extended continuous automated security to its offchain Rust code.

Button is building onchain infrastructure that lets users borrow, earn, and trade while maintaining custody of their Bitcoin. Early in development, Button integrated Octane directly into its CI/CD pipeline to surface real issues as code was written, fix them immediately, and avoid costly surprises before launch.

That decision quickly paid off. Button became an Octane power user, running a total of 25 scans during their pre-audit development process.

Building Button Better

This changed how the team built out Button:

  • Security findings surfaced as code was written, not weeks later
  • Engineers fixed issues immediately, while context was still fresh
  • Design decisions were informed by real attack paths, not hypothetical risks

By integrating Octane into CI/CD, Button turned vulnerability detection and remediation into a routine part of development, rather than a high-stress, end-of-cycle event.

As a result of this shift-left security approach, when Button was ready for a manual security review, the codebase was already hardened and clean.

Auditors found no critical vulnerabilities, no high-severity issues, and only a single medium-severity finding, which Octane had already surfaced. Button sent cleaner code off for audit because Octane had already caught the meaningful risk during development.

Source: @0xsallu

Securing Offchain Rust Code

When we released a beta version of a language-agnostic Octane model, Button was one of the first teams to integrate the new tool into its offchain Rust codebase. This expanded continuous security coverage across another critical attack surface.

Security is now continuous and automated across Button’s onchain and offchain infrastructure. By unifying tooling across environments, Button strengthened the entire system and reduced risk across its entire stack.

Make Audits Boring With Octane

Button’s approach shows what’s possible when security is built into development instead of bolted on at the end. With Octane running continuously in CI/CD, teams can catch real issues early, send cleaner code to auditors, and avoid costly remediation cycles down the line.

If you want to save time, reduce security spend, and make your audits boring like Button, reach out today to see what Octane can find in your codebase.

FAQs

What is “shift left” smart contract security, and how does it make smart contract audits boring?

"Shift left” means you run smart contract security checks while the codebase is still in development, not just once it's done. Button integrated Octane into CI/CD so vulnerabilities could be surfaced on pull requests, engineers could fix them immediately, and design decisions were informed by real attack paths. The payoff is simple: you send auditors cleaner code, avoid late remediation work, and turn an audit from a potential crisis into a final confirmation.

How does Octane fit into a modern CI/CD workflow for smart contract security?

Octane runs continuous security inside your CI/CD pipeline, meaning you can scan code changes as they land instead of waiting for a point in time audit. That keeps review tight around the actual diff, preserves developer context, and prevents security debt from compounding across weeks of commits. Button ran 25 scans pre audit, caught the meaningful risk early, and arrived at its final manual review with no criticals, no highs, and only one medium that Octane had already surfaced.

Can Octane secure offchain code too, like Rust, or is it only for Solidity smart contracts?

Octane is built for AI security for crypto across the stack, not just onchain contracts. Button extended automated security coverage to its offchain Rust codebase using Octane’s multi-language model, so security stayed continuous across both execution environments. That matters because real exploits often cross boundaries, where onchain assumptions meet offchain services, indexing, signing, or business logic.

Contents