Axiom published a product update describing formal verification work on OpenVM’s RISC-V (RV32IM) extension. The post says the work is done with Nethermind Research, supported by an Ethereum Foundation grant, and uses the Lean proof assistant to prove functional correctness against the RISC-V specification. The announcement also ties the verification milestone to OpenVM v1.5.0, which Axiom frames as bringing “provable 100-bit security” to the Axiom Proving API and the OpenVM stack more broadly.
The same week, the OpenVM project tagged OpenVM v1.5.0 on GitHub and the release notes call out two headline changes: the RV32IM extension’s formal verification in Lean, and an update to STARK protocol parameters targeting 100 bits of provable security using FRI. The release notes explicitly recommend upgrading to v1.5.0 so the STARK backend targets that security level.
In zkVM systems, the guest program’s correctness depends on two layers at once. The first layer is the virtual machine semantics: instruction decoding, arithmetic, memory consistency, and program flow must match the intended ISA. The second layer is the proving system: the ZK constraints must correctly enforce those semantics.
Axiom’s write-up frames Lean-based verification as a way to lock down the first layer and then increase confidence in the second. The post says the RV32IM implementation is proven to match the official SAIL specifications and to correctly constrain execution and memory consistency. If those claims hold as described, the practical takeaway is narrower “unknown unknown” risk. Bugs in instruction semantics and memory rules are the kind that can sit quietly until a high-value workload hits them, so proving the semantics against a spec is a high-leverage safety upgrade.
OpenVM’s own documentation echoes the positioning. It states that, as of February 2026, OpenVM v1.5.0 and later are recommended for production use, and it highlights the formal verification of the RV32IM extension in Lean by Nethermind Research.
The other major element in the v1.5.0 notes is a move to “100 bits of provable security” for the STARK protocol using FRI. In plain terms, this is a parameterization claim: the system is configured so that the probability of a successful soundness attack is on the order of 2^-100 under the relevant assumptions.
That matters because “security bits” are not just marketing in STARK design, they are tightly coupled to concrete protocol parameters such as query counts, blowup factors, and FRI configuration. A jump in target security can change proving cost, proof size, and verification constraints. For infrastructure teams choosing a zkVM or proving API, this is often the type of knob that decides whether a system is acceptable for production workloads.
OpenVM’s v1.5.0 release notes also mention a verifier and CLI requirement change for artifacts produced by the tooling (a wrapper_k requirement for the generated Halo2 verifier contract). That kind of implementation detail looks small, but it can break downstream build pipelines if teams do not regenerate verifier artifacts during an upgrade.
The fast path story is straightforward: a formally verified RV32IM extension plus higher STARK security targets is a credibility bump for OpenVM as zkVM infrastructure. The operational reality is more nuanced, and the next few signals matter.
First, adoption pressure tends to show up in integration repos and SDKs. If downstream projects upgrade host and guest crates to v1.5.0 quickly, it suggests the ecosystem sees the security move as worth the migration effort.
Second, the “100-bit” claim is best interpreted as a parameter and proof-system statement rather than a blanket guarantee about every possible deployment. The relevant question is whether projects using the Axiom Proving API or self-hosted OpenVM are pinned to the v1.5.0 STARK backend configuration and whether any optional settings can reduce that target.
Third, the verification work should eventually map to a public audit trail. Axiom’s post points readers to an OpenVM blog post and a full verification report. Those two documents are where assumptions, threat models, and scope boundaries become explicit, including what is proved, what is not proved, and what is treated as trusted.
The most stable references for this story are the Axiom product post and the OpenVM v1.5.0 release notes, not aggregator screenshots or relative-time social captures.
Axiom’s update is published on its blog as “Formally Verifying the OpenVM RISC-V Extension,” and it explicitly links the verification milestone to OpenVM v1.5.0 and the “provable 100-bit security” move. OpenVM’s own GitHub release notes for v1.5.0 list the formal verification and the STARK security parameter update as the main changes, with an explicit upgrade recommendation.
The post Axiom And Nethermind Ship Verified OpenVM Update appeared first on Crypto Adventure.
Also read: « C’est inédit depuis le 9/11 » : une ville américaine est coupée du monde et personne ne sait pourquoi