Skip to content
A bisexually lit version of the classic OHAYOCON logo with vertical CRTV lines.
Primary Navigation Menu
Menu
  • News
  • Attend
    • Get The App!
    • Pricing & Admission Info
    • Attendee Services
      • Accessibility Services
      • Customer Service
      • Lockers
      • Lost & Found
      • Public Safety
    • Hotels & Amenities
    • Map & Directions
    • Policies & Guidelines
    • Parents/Guardians’ Guide
    • Press Pass
  • Events
    • Ohayocon Schedule
    • Blood Drive (Red Cross)
    • Signature Events
    • Scavenger Hunt
    • Panels
    • AMVs
    • Ohayocon Public Library
    • Yuki Matsuri
  • Cosplay
    • Cosplay Expo
    • Photoshoots
    • Cosplay Lounge & Repair
    • Costume & Prop Policies
  • Gaming
    • Console & PC Gaming
    • Tabletop Gaming Library
  • Special Guests
    • Fan Guests
    • Voice Actors
    • Musical & Performance Guests
    • Industry Speakers
  • Exhibitors
    • Dealers Room
    • Artist Alley
    • Con Swap
  • Volunteering
    • Kohai
    • Volunteers
  • Contact Us
  • FAQ

Staff Login

OHAYOCON 24 — January 19-21, 2024 @ Hyatt Regency Columbus & Greater Columbus Convention Center

ENTRY POINT COMPROMISED: 0x1ef8b4dbfdc98c5dbb439f25381cc962a0feba53 :: Smart Contract Scan: Debug Entry-Point Active

By: Ohayocon Cosplay
On: April 29, 2026
In: Updates



ADMIN

Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E18FDC7FCBD2

Infrastructure Scan
ADDRESS: 0x1ef8b4dbfdc98c5dbb439f25381cc962a0feba53
DEPLOYED: 2026-04-22 21:02:11
LAST_TX: 2026-04-29 08:18:11
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED

? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.

Deactivate access mode immediately!

> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Bytecode size: 9661 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0xc4. [TRACE] Bytecode segment 0x01 analysed. [VALID] Data integrity: SHA256 verified. [DONE] Scan task 62E03D36 finished in 86s.

NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED

0xa58905dcfc2cbcd83237024643514372e7a11c6a 0xb3813fb12f1cca74425b6a354f772171aa37ab53 0x9d7be9bc39a21bec799aab7a6986978454ef57ca 0xdbbdedba83c93f6aa9b79da59369e4c18e5a6e16 0x30b523bb5cdef3a979335a3e3be337da28424e0c 0x77a59de2cd99350cad4c939521851edbc8c74f1a 0x4475b22f6e258a344e551e80213ee0e61898de2b 0xb7449bf896cdca952d4f4e4badbd559b8a8333ae 0x2e5aec0c5c548a1721c573d9f59167c8b137223f 0xbd3898de1637ffb50c0b12bb833ba346a4f8edc1 0x9c7fd103cb6cf032544374adadf45b9e5b5d06c7 0xe00142a7c441e1315e508a23f1e481a031335b61 0x4b96e466667fc5085efc55296c96e352ba44cde8 0x1ac4e00645528a53c87598adaa2f609d25b7f00c 0x12c6cf251ed2b395648df4cbdc4616a1ca51de53 0xafd1694d5d978ea2be6a1bd90bdcf8fcfd835f27 0x4090632ecf7c992409082e1bfedb90707b0b4ccb 0x6f3441ae4059a261c207f255200d8e905f9770e4 0xd88a268fb48dacc518ffcb4b4d468e80cd1dd2a4 0x07ab9a397dcb4d66f3dec0025aa923da8ff860f0

2026-04-29
Previous Post: IMMEDIATE THREAT LOG: Critical Log: 0x71d8e1e91c3d60f76c39971bd78e5c8b02152cde Production-Stage Debugging Active
Next Post: SECURITY SHUTDOWN WARNING: Technical Warning: 0xa848334f1687452c8896040a5069817a2a9e0723 Debug-Mode Configuration Error

Ohayocon, the Ohayocon logo, and the Lindsay Howard mascot are trademarks of Ohayocon. All Rights Reserved.

Skip to content
Open toolbar Accessibility Tools

Accessibility Tools

  • Increase TextIncrease Text
  • Decrease TextDecrease Text
  • GrayscaleGrayscale
  • High ContrastHigh Contrast
  • Negative ContrastNegative Contrast
  • Light BackgroundLight Background
  • Links UnderlineLinks Underline
  • Readable FontReadable Font
  • Reset Reset
  • FeedbackFeedback