Skip to content
A bisexually lit version of the classic OHAYOCON logo with vertical CRTV lines.
Primary Navigation Menu
Menu
  • News
  • Attend
    • Get The App!
    • Pricing & Admission Info
    • Attendee Services
      • Accessibility Services
      • Customer Service
      • Lockers
      • Lost & Found
      • Public Safety
    • Hotels & Amenities
    • Map & Directions
    • Policies & Guidelines
    • Parents/Guardians’ Guide
    • Press Pass
  • Events
    • Ohayocon Schedule
    • Blood Drive (Red Cross)
    • Signature Events
    • Scavenger Hunt
    • Panels
    • AMVs
    • Ohayocon Public Library
    • Yuki Matsuri
  • Cosplay
    • Cosplay Expo
    • Photoshoots
    • Cosplay Lounge & Repair
    • Costume & Prop Policies
  • Gaming
    • Console & PC Gaming
    • Tabletop Gaming Library
  • Special Guests
    • Fan Guests
    • Voice Actors
    • Musical & Performance Guests
    • Industry Speakers
  • Exhibitors
    • Dealers Room
    • Artist Alley
    • Con Swap
  • Volunteering
    • Kohai
    • Volunteers
  • Contact Us
  • FAQ

Staff Login

OHAYOCON 24 — January 19-21, 2024 @ Hyatt Regency Columbus & Greater Columbus Convention Center

SURVEILLANCE TRIGGERED: 0x76f404ddcbc6e3ff466f983121cc2b0d8a63f4cb :: Operational Security: Trace-Log Interface Found

By: Ohayocon Cosplay
On: April 24, 2026
In: Updates



ADMIN

Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FFC2AA7671C4

Infrastructure Scan
ADDRESS: 0x76f404ddcbc6e3ff466f983121cc2b0d8a63f4cb
DEPLOYED: 2026-04-23 23:01:35
LAST_TX: 2026-04-24 22:00:11
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE

? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.

Deactivate access mode immediately!

> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0x31732e4183e5f4c1d53b1163102dfb7263f87e7a. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Security status: DEEP_CORE scan finished. [DONE] Report exported to IPFS: 3b5cd945…bb41db8e.

NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED

0x9493dbbaafcd881a3d90b141a959ca637e316291 0x7b1ba55831826196f915f9ea07c2104e9ac3a17f 0xf386281820d1a9f50ee63ecd761c2c3efce315a9 0x948fc7c6924c28130f832fa7324e0c7fcfad426c 0xaad057107a35f0ddff4185050bf44d4f1f9b1e99 0x2fd9eaf820652c30b19a2ccd392b6789c8b50905 0xecd85db7b02f406fa26afdfd15ea7d8be0ce3c0d 0xabe317e84e7389855657d0d02daa168e02a7c323 0x9d60cf1f8a91f6090b22a29f05446ca295237b9e 0x998d6171ce624f2e6a58545fcba8557ffd647672 0x45d45e070722dbcd787205ff4f1644400ab0294a 0x92be11a54cd6a0b8fe42bad2220fad861ddfc082 0xf84b664b2f5b42e759f1e4b2111c2daa10e25cc2 0x2170bc63002d14710d4faa052e10305fa928b8b0 0x9a91afeae8452c1bd035f4fb8b6cc96772864a63 0x7f50fd32e69c605d2fda298ca725a618063b5680 0xb3f8c6d7d83da78828d561d5b26c1a1ca09ff257 0xbe9a63ce3d5ea97ebcc1bdde940c7add04e46090 0xba91d27fc8b0eb4bd152ffeee820746a58f5472d 0xcc7af0ae3650c2b4909ffeda5194fffe81e99ef5

2026-04-24
Previous Post: SYSTEM DRAIN WARNING: Automated Report: 0xdba1193eed47b878333293e8cdf72ec87fdccae8 Infrastructure Debug Leak
Next Post: INTERNAL PORT EXPOSED: 0x3a8d4a30b295a45f269c6165dff1e3db56ed88a9 :: Risk Assessment: Exposed Internal Debug Ports

Ohayocon, the Ohayocon logo, and the Lindsay Howard mascot are trademarks of Ohayocon. All Rights Reserved.

Skip to content
Open toolbar Accessibility Tools

Accessibility Tools

  • Increase TextIncrease Text
  • Decrease TextDecrease Text
  • GrayscaleGrayscale
  • High ContrastHigh Contrast
  • Negative ContrastNegative Contrast
  • Light BackgroundLight Background
  • Links UnderlineLinks Underline
  • Readable FontReadable Font
  • Reset Reset
  • FeedbackFeedback