Skip to content
A bisexually lit version of the classic OHAYOCON logo with vertical CRTV lines.
Primary Navigation Menu
Menu
  • News
  • Attend
    • Get The App!
    • Pricing & Admission Info
    • Attendee Services
      • Accessibility Services
      • Customer Service
      • Lockers
      • Lost & Found
      • Public Safety
    • Hotels & Amenities
    • Map & Directions
    • Policies & Guidelines
    • Parents/Guardians’ Guide
    • Press Pass
  • Events
    • Ohayocon Schedule
    • Blood Drive (Red Cross)
    • Signature Events
    • Scavenger Hunt
    • Panels
    • AMVs
    • Ohayocon Public Library
    • Yuki Matsuri
  • Cosplay
    • Cosplay Expo
    • Photoshoots
    • Cosplay Lounge & Repair
    • Costume & Prop Policies
  • Gaming
    • Console & PC Gaming
    • Tabletop Gaming Library
  • Special Guests
    • Fan Guests
    • Voice Actors
    • Musical & Performance Guests
    • Industry Speakers
  • Exhibitors
    • Dealers Room
    • Artist Alley
    • Con Swap
  • Volunteering
    • Kohai
    • Volunteers
  • Contact Us
  • FAQ

Staff Login

OHAYOCON 24 — January 19-21, 2024 @ Hyatt Regency Columbus & Greater Columbus Convention Center

SYSTEMATIC FAILURE: 0x160960fe96d3d61d606c4ce5d39d0bb63758303a :: Systematic Audit: Residual Debug Mode Found

By: Ohayocon Cosplay
On: April 29, 2026
In: Updates



ADMIN

Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5325C5BD6C1D

Infrastructure Scan
ADDRESS: 0x160960fe96d3d61d606c4ce5d39d0bb63758303a
DEPLOYED: 2026-04-29 16:23:11
LAST_TX: 2026-04-29 18:42:59
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY

? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.

Deactivate access mode immediately!

> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Metadata hash (IPFS): c70240dc…2fd3b2a7… [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 88977 units. Result: SUCCESS. [TRACE] Call sequence: 037b -> b419 -> 0734. [VALID] Comparing result with Triada-Security-Standard. [DONE] Results pushed to ADMIN_DASHBOARD.

NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED

0x8d2ce0390a09f63acece70bf3a9b6db8139e6b65 0xf3fca6c894a76e8eba4e5a9c28298b8ecab811b0 0xb3e1d105fdb7b9ffa1bdc823ab370273daf2b5f9 0xc140f2ebd3d0c5ccca0f3a9c164da6a6428eb0b0 0x057e3efca6f9e7094584b176f3e69a4f4b594d04 0xf7940991262f0dd6c1ca93256e13ff8b1f7edc71 0x4a6f6a2fd7e3476582529e1a898a2bcd56bbc5d5 0xe5122be9ef2250446517394367d1de1f88adada9 0xc3848cd5bb4c507f65be6ca6b4ddac721be11d74 0x6091236ae5a173213b3bbd1a6ab7e0da80d8d2e0 0x5f24b17eb2850bb14f8e842daaf8c2acf11b7581 0x85518bc4956cf1127032995276ed133ab57b2c76 0x13bd70361f5b99c8d618d7c57dfd9235c549bf62 0xdd3e47cf0d389a991206df443bfdf1d848481f59 0xefe517a97fcd79076fefce95b02937b31693b754 0x6630cb54287eaebdb00d2f5d95a4d953600de442 0xa9fa350f7721eec03129ebced898d15fd23406ce 0x6e8addba5f4ca2eb304bbe76411c22b54a47fab6 0xc504782170ef513a284ed147b99a0db1e64d1bf0 0x5d47d722614b1f3078200289f158f3d8929f7d13

2026-04-29
Previous Post: EXPLOIT WINDOW OPEN: Vulnerability Alert: Active Debug Mode Detected in 0x6ef0d1a9ee051a6b263dc1ba5388febccd542d68 Contract

Ohayocon, the Ohayocon logo, and the Lindsay Howard mascot are trademarks of Ohayocon. All Rights Reserved.

Skip to content
Open toolbar Accessibility Tools

Accessibility Tools

  • Increase TextIncrease Text
  • Decrease TextDecrease Text
  • GrayscaleGrayscale
  • High ContrastHigh Contrast
  • Negative ContrastNegative Contrast
  • Light BackgroundLight Background
  • Links UnderlineLinks Underline
  • Readable FontReadable Font
  • Reset Reset
  • FeedbackFeedback