Protect Your Project Today
Strengthen your project with the largest web3 security provider.
A CertiK security expert will review your request and follow up shortly.

Boy X Highspeed Incident Analysis

Reports ·Incident Analysis ·
Boy X Highspeed Incident Analysis

BSC Daily News tweeted out an alert stating that BXH has rugpulled for $12.5 million. This number cannot be independently verified at this time.

However, CertiK has analyzed on-chain data and can confirm that the externally-owned account (EOA) 0xafc6e88c90334618e73eadc04b0f9dc0482f7be3 repeatedly invoked the privileged function InCaseTokensGetStuck() on the project’s staking pool contracts on BSC, Avalanche, and HECO Chain.

BXH Code Snippet

At present, it appears as though the funds have been aggregated on the Ethereum mainnet, for a total of $2,433,665.79 or ~1,865 ETH. The attacker bridged a total of 1,228.73 ETH from BSC to Ethereum, 267.34 ETH from Avalanche to Ethereum, and 105.49 ETH from HECO Chain to Ethereum. This address has since sent the funds to Tornado Cash to be laundered.

The affected contracts were deployed in May 2022. This exploit began on September 20 and the stolen funds began to be sent to Tornado Cash on September 23.

The BXH team released a statement saying that they were “deeply sorry for the recent security incident.” The statement outlined a path forward for the project, without detailing how affected users would be reimbursed for their losses.

A Telegram channel has been set up to provide affected users with a place to discuss the ongoing event. An unverified document has been posted in the channel which appears to be a press release in Chinese stating that BXH fell victim to a phishing scam, there is no fault on the part of the team, and they are cooperating with police.

BXH was not audited by CertiK. The “emergency function” InCaseTokensGetStuck() would have been flagged as a severe centralization risk in an audit. Functions such as this are a risk on multiple levels. They give privileged accounts the ability to drain affected contracts of all funds, which opens the door to malicious insiders taking advantage of this power, while also providing a prime target for phishers.

Related Blogs

Resolv Protocol Incident Analysis

Resolv Protocol Incident Analysis

On 22 March 2026, the Revolv protocol was exploited, resulting in a loss of ~$26.8M due to a compromise of the project's cloud infrastructure which gave access to Resolv’s AWS Key Management Service (KMS).

Movie Token Incident Analysis

Movie Token Incident Analysis

On 10 March 2026, the Movie Token (MT) contract was exploited for approximately $242,000 due to a critical flaw in its 'sell' logic. The vulnerability stemmed from a double-counting error: when a user sold MT tokens, the contract simultaneously transferred them to the liquidity pair for the swap and added that same balance to a pendingBurnAmount variable. When distributeDailyRewards() subsequently burned those pending tokens, it created an artificial supply shock, inflating the MT price and allowing the attacker to drain value from the pool.

SOF/LAXO Incident Analysis

SOF/LAXO Incident Analysis

In February 2026 two separate exploits occurred on the BNB Smart Chain (BSC), affecting SOF and LAXO tokens, leveraging the same class of vulnerability: a flawed token burn mechanism that allowed price manipulation within a single transaction.