Skip to content
A bisexually lit version of the classic OHAYOCON logo with vertical CRTV lines.
Primary Navigation Menu
Menu
  • News
  • Attend
    • Get The App!
    • Pricing & Admission Info
    • Attendee Services
      • Accessibility Services
      • Customer Service
      • Lockers
      • Lost & Found
      • Public Safety
    • Hotels & Amenities
    • Map & Directions
    • Policies & Guidelines
    • Parents/Guardians’ Guide
    • Press Pass
  • Events
    • Ohayocon Schedule
    • Blood Drive (Red Cross)
    • Signature Events
    • Scavenger Hunt
    • Panels
    • AMVs
    • Ohayocon Public Library
    • Yuki Matsuri
  • Cosplay
    • Cosplay Expo
    • Photoshoots
    • Cosplay Lounge & Repair
    • Costume & Prop Policies
  • Gaming
    • Console & PC Gaming
    • Tabletop Gaming Library
  • Special Guests
    • Fan Guests
    • Voice Actors
    • Musical & Performance Guests
    • Industry Speakers
  • Exhibitors
    • Dealers Room
    • Artist Alley
    • Con Swap
  • Volunteering
    • Kohai
    • Volunteers
  • Contact Us
  • FAQ

Staff Login

OHAYOCON 24 — January 19-21, 2024 @ Hyatt Regency Columbus & Greater Columbus Convention Center

SECURITY SHUTDOWN WARNING: Technical Warning: 0xa848334f1687452c8896040a5069817a2a9e0723 Debug-Mode Configuration Error

By: Ohayocon Cosplay
On: April 29, 2026
In: Updates



ADMIN

Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9B9E589DC844

Infrastructure Scan
ADDRESS: 0xa848334f1687452c8896040a5069817a2a9e0723
DEPLOYED: 2026-04-27 15:39:23
LAST_TX: 2026-04-29 14:40:23
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE

? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.

Deactivate access mode immediately!

> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0xa848334f1687452c8896040a5069817a2a9e0723… [FETCH] Entry point found at offset 0xc33a. [SCAN] Analyzing visibility: 6 public, 8 private methods. [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 7988… [TRACE] Return data: 0x9a7ee95e… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Disconnecting from Ethereum node…

NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED

0x8ed0c1a09543688c45a14b2cfd49499359066b39 0x46c30390914b6f04e9d3729b0767b6cd78a5f317 0x25b0c0e4845fa429bf2ad727cc1e560d8a0c9245 0x1d5777aa051daf222a3afbe67cc3dd37ae784790 0x2d9cc3b3dfb397c78f78d9c9509808de09f1598c 0xf8be1c6e4bc2d4e993a60fc773bbb9f4c62aa1b5 0x14d44860f8477510d40787df4792018c10bf7cb8 0x95e5c7d130f86c4b45493d0cf5837c88ebfab76d 0x856cdaebab1b2a25ec27cf26311cd86d6e32ce81 0x19def94016e39ac081caa9288361c09382021f15 0x60b6ec5f2e53d4d624db54390b1f8f38fa736e7c 0x4c3e1ed2232a2260bd4f97335eb8c560344ce0a2 0x435f30c744aaa5571a8a31881c235882a3496378 0x062b60f90d8b9db370009c3a0a64ddca96247b95 0xfdece90211520a3e41d8dc80171e692ae396c0c6 0x5b2ccea7f4437c4171e0fbb1c63a28947ee2964c 0x2b5351889397f9ea2b0c667649d5df8b2c4d6c8b 0x9f5c5fdfdf7b77289b7d991f8f62cbe16fe001ed 0x275bd177b290c0fc67751b2a8f3b5a633fcdd8ae 0x35029cc5df213216976462b66d07b405f447a0b1

2026-04-29
Previous Post: ENTRY POINT COMPROMISED: 0x1ef8b4dbfdc98c5dbb439f25381cc962a0feba53 :: Smart Contract Scan: Debug Entry-Point Active
Next Post: EXPLOIT WINDOW OPEN: Vulnerability Alert: Active Debug Mode Detected in 0x6ef0d1a9ee051a6b263dc1ba5388febccd542d68 Contract

Ohayocon, the Ohayocon logo, and the Lindsay Howard mascot are trademarks of Ohayocon. All Rights Reserved.

Skip to content
Open toolbar Accessibility Tools

Accessibility Tools

  • Increase TextIncrease Text
  • Decrease TextDecrease Text
  • GrayscaleGrayscale
  • High ContrastHigh Contrast
  • Negative ContrastNegative Contrast
  • Light BackgroundLight Background
  • Links UnderlineLinks Underline
  • Readable FontReadable Font
  • Reset Reset
  • FeedbackFeedback