๐Ÿ“‹ Copied!
Security Incident โ€” March 14, 2026

Full Transparency
Report

The 0xWork Team's wallet API key was compromised. This report covers everything โ€” what happened, what was taken, what's safe, and how much the attacker has made. Nothing held back.

Published: March 18, 2026 ยท 08:30 UTC ยท by the 0xWork Team

Attacker Wallet โ†— $AXOBOTL Chart โ†—
Attacker Balance
$8,490
Fees / Day
~$200
Days Since Attack
4
24h Volume
$51,275
Locked AXOBOTL
4B
ENS Identity
None โŒ
โ†“ full report below โ†“
Attack Flow

How the Funds Moved

๐Ÿ”‘ GitHub Leak
API key exposed
โ†’
๐Ÿค– Bot Detection
Automated scanner
โ†’
โšก HandleOps
ERC-4337 drain
โ†’
๐Ÿ”„ Velora DEX
All tokens โ†’ ETH
โ†’
๐Ÿ’ฐ Attacker Wallet
3.667 ETH held
Summary

What Happened

While pushing code to a public GitHub repository, test files containing the Bankr wallet API key were accidentally included. Automated bots that continuously scan public repos for exposed secrets found it within minutes and executed a full drain.

Beyond the immediate wallet drain, the attacker used the compromised key to permanently redirect the $AXOBOTL creator fee beneficiary to their own address on the Clanker locker contract. The 0xWork Team confirmed with Clanker: there is no admin override and no way to reverse this on the current contract.

๐Ÿ”ด

Ongoing Revenue Drain

Every $AXOBOTL trade now generates creator fees that flow directly to the attacker's wallet. At current 24h volume of ~$51K, this represents approximately $200/day in ongoing losses โ€” every single day until a token migration is executed.

โœ…

Platform Is Fully Safe

0xWork smart contracts, the deployer wallet, all user funds, agent data, and active bounties are completely untouched. The platform is live, operational, and shipping every day.


Impact Assessment

What Was Taken vs. What's Safe

๐Ÿ’ธ

Wallet Balance

Fully Drained
ETH, USDC, AXOBOTL, BNKR and misc tokens. Liquidated via Velora DEX within 25 minutes of the attack.
๐Ÿ”„

Creator Fee Revenue

Permanently Redirected
$AXOBOTL fee beneficiary changed to attacker's wallet on Clanker locker. Confirmed irreversible.
๐Ÿ”’

Team Finance Lock NFT

4B AXOBOTL Locked
Token lock NFT holding 4 billion $AXOBOTL. Locked until January 2027 โ€” ~$3,200 at current price.
๐Ÿ“„

0xWork Contracts

Safe โœ“
All smart contracts remain fully secure, verified, and operational. Zero impact from the attack.
๐Ÿ”‘

Deployer Wallet

Safe โœ“
The core deployer wallet was completely unaffected by the API key compromise.
๐Ÿ‘ฅ

User Funds & Data

Safe โœ“
All user funds, agent data, active bounties, and platform features remain 100% intact.
~$4K
Initial
Initial Drain
$636
3 days
Fees Harvested
~$3.2K
Locked
Locked Tokens
100%
Secure
Platform Safety

Estimated Financial Breakdown

Initial ~$4K
Fees $636
Locked ~$3.2K
Platform: Safe
Initial drain (~$4,000)Fees harvested ($636)Locked tokens (~$3,200)Platform secure

Attack Timeline

Step-by-Step: How It Unfolded

โฑ Hours Before Attack
API Key Accidentally Pushed to Public GitHub
Test files containing the Bankr wallet API key were included in a public repo commit. Automated secret-scanning bots that monitor GitHub 24/7 detected it almost immediately.
Root CauseGitHub Leak
๐Ÿ•– 19:19 UTC โ€” March 14, 2026
First Drain โ€” 1.118 WETH + 1.63B AXOBOTL
Attacker submits ERC-4337 UserOps via Bankr's HandleOps. 1.118 WETH (~$2,345) and 1,630,658,563 AXOBOTL pulled from the 0xWork Team's wallet.
ERC-4337 HandleOps~$2,345 WETH
๐Ÿ•– 19:21 UTC
Everything Else Swept
286 USDC, 9,065 BNKR, 1.66B $OHIO, and 389M $BOBBI tokens transferred to attacker's wallet in rapid succession.
$286 USDC9,065 BNKRMisc tokens
๐Ÿ•– 19:32โ€“19:43 UTC
Liquidation + Permanent Fee Redirect
All stolen tokens sold for ETH via 0x Allowance Holder + Velora (Paraswap). Simultaneously, the $AXOBOTL creator fee beneficiary is permanently changed to attacker's address on the Clanker locker.
Velora DEXFee Redirect โ€” PERMANENT25 min total
๐Ÿ“… March 15, 16, 17 โ€” Daily
Fee Harvesting โ€” ~$200/Day, Still Running
Attacker calls collectFees() on the Clanker contract once per day. Collects WETH + AXOBOTL creator fees, then immediately dumps all AXOBOTL for ETH via 0x. Fully automated, running like clockwork.
~$200/dayDaily PatternStill Active
๐Ÿ“… Post-Attack
Recovery Attempt โ€” No Response
The 0xWork Team identified the attacker on-chain and sent a direct offer to return funds with a deadline. This announcement was delayed to give that process a chance. The deadline passed with no response.
Offer SentDeadline PassedNo Response
๐Ÿ“… March 18, 2026 โ€” Today
Security Overhaul + Public Disclosure
All API keys rotated. IP whitelisting enabled on Bankr. Trusted address restrictions active. Full security audit of all systems complete. Holder snapshot taken. Community informed.
Keys RotatedIP Whitelist ONAudit DoneSnapshot Taken

Attacker Profile

On-Chain Analysis

๐Ÿ•ต๏ธ
Unknown Attacker
0xd59ce5813f8eeb7fba80d7b1be7b605def89bc45 ๐Ÿ“‹
Current Balance
$8,490
3.667 ETH ยท no outbound moves
Initial Drain
~$4,000
Mar 14 ยท 19:19โ€“19:43 UTC
Fees Harvested
$636
3 days (Mar 15โ€“17)
Daily Fee Rate
~$200
Every trade ยท ongoing
Locked Tokens
~$3,200
4B AXOBOTL ยท Jan 2027
Total Damage
$11,700+
Rising ~$200 every day
DateWETH CollectedAXOBOTL CollectedAXOBOTL โ†’ ETHEst. USD
Mar 14 (initial)0.015811,876,7550.030 ETH~$55
Mar 150.079579,028,5770.083 ETH~$340
Mar 160.019833,447,2710.031 ETH~$115
Mar 170.017266,501,4580.043 ETH~$134
Fee Total0.1323 WETH190,854,061~0.187 ETH$636
โš ๏ธ

Attacker Behaviour Pattern

Collects fees once daily. Immediately dumps all AXOBOTL for ETH. Holds all proceeds in the same address. No mixing, no bridging, no obfuscation attempts. Fully trackable. But recovery still requires a token migration.


Digital Forensics

Attacker Identity Investigation

The 0xWork Team conducted a thorough investigation across multiple blockchain identity platforms to trace the attacker. Results below:

๐Ÿ” Identity Lookup Results

๐Ÿท๏ธ
ENS Domain
None โŒ
๐Ÿ‘ค
Web3 Bio Profile
None โŒ
๐Ÿ–ผ๏ธ
Avatar / PFP
None โŒ
๐Ÿ“ง
Email / Social
None โŒ
๐Ÿ”—
Ethereum Mainnet
0 ETH / 0 txns
๐ŸŒ
Multichain
Base ONLY
๐Ÿ‘ฅ
Followers
0
๐Ÿ“Š
Wallet Age
4 days

๐Ÿงฉ Key Forensic Findings

  • ๐Ÿ”น Ghost wallet โ€” zero identity across ENS, Web3.bio, Etherscan labels, and social platforms
  • ๐Ÿ”น Base-only activity โ€” $0 on Ethereum mainnet, zero transactions on any other chain
  • ๐Ÿ”น Created for this attack โ€” wallet's first ever transaction was the drain itself (Mar 14)
  • ๐Ÿ”น Automated behaviour โ€” fee collection happens at consistent daily intervals, likely scripted
  • ๐Ÿ”น No mixing/bridging โ€” all 3.667 ETH sitting at same address, zero outbound transfers
  • ๐Ÿ”น Professional scanner bot โ€” used ERC-4337 infrastructure, not a manual attack. Likely part of a wider key-scanning operation targeting GitHub leaks
๐Ÿ”Ž

Ongoing Monitoring

The 0xWork Team continues to monitor this wallet. If any ETH moves to a CEX (centralized exchange), identity recovery may become possible through KYC data requests. The wallet is flagged.


Root Cause

What Went Wrong

Textbook secret-in-repo incident. The Bankr API key was accidentally committed in a test file to a public GitHub repo. Automated bots scan every public push in real-time looking for this exact pattern.

Bankr has IP whitelisting and trusted address restrictions built specifically to prevent this attack. The 0xWork Team didn't activate them in time. Full accountability โ€” no excuses.

๐Ÿ”‘

API Key in Public Repo

Test credentials committed to GitHub. Secret-scanning bot found it within minutes of the push.

๐ŸŒ

No IP Whitelisting

Bankr's IP restriction was not enabled. API accepted calls from any IP globally.

๐Ÿ“

No Trusted Addresses

Bankr's trusted destination restriction was inactive. Funds could be sent anywhere.

โšก

ERC-4337 Speed

Account abstraction enabled near-instant execution. Full attack completed in under 25 minutes.


The 0xWork Team's Response

What's Been Done

๐Ÿ”„

All Keys Rotated

Every API key, secret, and credential across all services revoked and reissued immediately.

๐ŸŒ

IP Whitelisting Active

Bankr API now restricted to known server IPs only. No external access.

โœ…

Trusted Addresses Set

All wallet APIs restricted to pre-approved destination addresses only.

๐Ÿ”

Full Security Audit

Every credential, service, access point, and public repo reviewed across all systems.

๐Ÿ“ธ

Holder Snapshot Taken

All current $AXOBOTL holder balances captured for the migration airdrop.

โ›“๏ธ

Attacker Contacted

Direct offer sent on-chain with a deadline to return funds. No response received.

๐Ÿ›ก๏ธ

Every Precaution Is Now Active

Everything that should have been in place from the start is now active. Documented internally as a permanent lesson. It will not happen again.


Path Forward

Token Migration โ€” Community Input Needed

The only way to fully stop the daily fee drain and neutralize the locked tokens is a token migration: a new $AXOBOTL contract with a 1:1 airdrop to all legitimate holders โ€” attacker wallet excluded from the snapshot.

The holder snapshot has already been taken. If the 0xWork Team proceeds, no legitimate holder loses a single token. The attacker's locked 4B AXOBOTL becomes worthless. The fee redirect on the old contract becomes irrelevant.

Proposed Migration Plan

  • Deploy new $AXOBOTL V2 contract โ€” identical tokenomics, clean fee beneficiary pointing back to the 0xWork Team.
  • Use existing holder snapshot โ€” already taken as of March 18, 2026. Attacker wallet excluded.
  • 1:1 airdrop to all holders โ€” every legitimate holder receives the exact same balance in V2 tokens.
  • Announce migration window โ€” clear timeline and instructions for the community.
  • Deprecate old contract โ€” community migrates, old $AXOBOTL liquidity moves to V2.
๐Ÿ’ก

Your Input Matters

The 0xWork Team is not executing this without community consensus. If you've been holding, supporting, or building with $AXOBOTL โ€” feedback is wanted before any action is taken.

๐Ÿ“‰ Cost of Waiting โ€” Projected Losses

30 Days
~$6,000
Fees to attacker
6 Months
~$36,000
Cumulative drain
Until Lock Expires (10 mo)
~$60,000+
+ 4B tokens unlock to attacker
โฐ

Every Day Counts

Every day without migration = another ~$200 flowing to the attacker. Plus 4 billion locked tokens that unlock to them in January 2027. Migration eliminates all of it in one move.


Message to the Community

"None of this changes what the 0xWork Team is building."

The platform is live. The 0xWork Team ships every single day. Someone stealing doesn't stop that โ€” it makes the team more determined to build something they can't touch.

To everyone who has been holding, supporting, and building โ€” thank you. Genuinely. This announcement was delayed to exhaust every recovery option first. The community deserved the full truth before it went public.

$AXOBOTL Contract โ†—