Original author: ZachXBT
Original translation: Deep Tide TechFlow
Deep Tide introduction: On-chain detective ZachXBT released a complete investigation report, accusing multiple employees of the cryptocurrency trading platform Axiom of abusing internal system permissions for over a year, querying users' private wallet information and engaging in insider trading. The investigation was initiated at the request of clients, with evidence including recorded calls, internal screenshots, and on-chain fund flow diagrams. Involved employees planned to help associates quickly profit $200,000. Axiom has generated over $390 million in revenue so far, and this case reveals significant loopholes in the internal permission management of cryptocurrency platforms.
(1)
Meet @WheresBroox (Broox Bauer). He is one of the employees involved at @AxiomExchange, accused of using the lack of internal tool controls to access sensitive user information and engage in insider trading by tracking private wallet activities since early 2025.



(2)
Axiom is a cryptocurrency trading platform founded by Mist and Cal in 2024. After going through Y Combinator's winter class in 2025, it quickly became one of the most profitable companies in the field, with cumulative revenue exceeding $390 million to date.
I was commissioned by clients to investigate accusations of misconduct at Axiom after receiving relevant reports.


(3)
Broox is currently a senior business development employee at Axiom, based in New York.
In recorded clips, Broox stated that he could track any Axiom user through referral codes, wallet addresses, or UIDs, claiming he could "find out everything about this person."
He also described how he initially only checked 10 to 20 wallets and gradually increased the number over time—"so it wouldn't look so suspicious."
In another segment of the same recording, Broox set rules for team members to request queries from him, stating that he would send the complete list of wallets.
This complete recording comes from a private planning call among the group members.
(4)
In April 2025, Broox shared a screenshot from Axiom's internal backend, showing the private wallet information of trader "Jerry."
In August 2025, Broox sent a second screenshot showing the registration information and associated wallet of trader "Monix."
In the same August, Broox also discussed querying Axiom users who had traded the meme coin "AURA."



(5)
The group established a Google Spreadsheet compiling wallet addresses of multiple KOL targets. These addresses were organized from data obtained by Broox from Axiom's internal backend.
Several KOLs named in the spreadsheet or appearing in leaked screenshots have been contacted and independently confirmed the accuracy of their wallet data.

(6)
One of the targeted KOLs is Marcell, a trader known for treating fans on X and Telegram as "dumping pawns."
He became a target because he has a habit of purchasing tokens in large amounts with his private wallet before promoting meme coins (i.e., "bundle building"), then calling out to his followers.
Traders like Marcell are ideal targets for such abuses of power—he has a low address reuse rate, and his private wallets are rarely public, which increases the value of insider privilege information.




(7)
Through private chat messages, Broox's main wallet was identified, with all directly associated addresses mapped out.
FarpaWkzio7WQVpQeu2eURvNQZ3pCBZupJ95wUjoHcUN
Due to the numerous meme coin transactions associated with these addresses, it is difficult to pinpoint high-confidence insider trading cases solely based on wallet data—unless internal logs from Axiom can be obtained to verify the timing of trades.
The funds from the associated addresses mainly flowed to the following centralized exchange recharge addresses:
- 9HtKkLzTVUGMS9BDMSXbVjooP1rVoeiFPj3tEtmj7Qn4
- A8XSEaZXYo8eidAMivoAonf8skBeW1QkfprdBJm6eVz
- HPr1MSrSB2i9r9Vcsj8Cmx2sUFGudpDum6kY9dp2ePCN
- Afp4DargofX8K67BRUuhVuoBy1DJn9vTbH3ico9CaNs1
- 6rv1iSZ7YyR18R7EPvXwHdDkNp3qzrE9YPQtPnLVaYbv

(8)
Broox was on the call with his friend Gowno (Seb), a moderator who recently joined Axiom.
In the first recording, Broox claimed that Ryan (Ryucio)—another business development employee at Axiom—had used the internal backend to check user information for others, and stated he had helped get his friend Mystery into Axiom as a moderator.
In the second recording, Broox discussed how Gowno's responsibilities would expand over time, indicating that he could eventually assist with wallet queries.
Ryan and Mystery did not appear in this recorded call.

(9)
In this recording from February 2026, Broox detailed a plan: using his privileges at Axiom to help Gowno quickly profit $200,000. This closely matches the similar violations he has engaged in with others since early 2025.
He also shared a screenshot of his exchange account balance in private chat, indicating that this scheme was already generating actual profits.



(10)
This investigation was commissioned by clients, and I acted as an independent investigator into the allegations of misconduct at Axiom; the above is the conclusion of the investigation.
Earlier today, I contacted the Axiom team for comments, and their official statement is attached to the original text.
Whether Cal or Mist were aware, the company established virtually no monitoring mechanisms or access control protocols from the beginning to prevent such abuses of power.
The data access range granted to employees by the company is quite broad—in an easily accessible backend system, employees can see a complete list of users' wallets (including date/time), wallets being tracked by users, transaction history, wallet nicknames, and associated accounts. These permissions are indeed rare for business development positions.
Given that Broox is based in New York, I believe this case might be a good opportunity for the Southern District of New York Federal Prosecutor's Office (SDNY) to intervene, as it could fall within their jurisdiction.
Whether or not criminal charges are ultimately filed, I hope the co-founders of Axiom will conduct further internal investigations into these abuses of power and consider legal action against the involved employees.

Editor's note: This article is translated from a tweet investigation report, and the images are screenshots of the investigative evidence.
免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。
