Back to Blog

What Are the 7 Key Features of Transaction Simulation Phalcon Explorer 1.0

Phalcon
May 31, 2023

We were thrilled to receive so much positive feedback and engagement from both longtime users and new followers after launching our 7 Days of Phalcon journey on Twitter. We’re proud that Phalcon has solved real-world problems for so many users, such as Phalcon providing the jump-level debug to analyze the transaction and intuitive before-and-after comparisons of transaction states, etc.

Now, we’ve compiled the features we highlighted during the journey. We want to emphasize that Phalcon offers far more than just these 7 features — there are countless possibilities waiting for you to explore.

So let’s dive in and explore!

Feature 1: Presenting Balance Changes

Track asset shifts across all transaction addresses with our ultimate tool. It provides a clear summary of token variations and calculates the USD value for mainstream tokens. Check your results on our webpage or export them as XLS/CSV files.

Ideal for developers debugging contracts and security researchers probing attack transactions, Balance Changes simplifies asset variation analysis and pinpoints affected or profitable addresses.

See it in action: Related Link

Feature 2: Presenting Fund Flow

Visualize token transactions as directed graphs with our tool, Fund Flow. Nodes represent unique addresses and are color-coded as senders and recipients. Edges detail transfer direction, tokens, and amount, making transactions transparent and intuitive.

With Fund Flow Feature of Phalcon, edges have serial numbers for chronology, colors for token types, and identical flows are merged for simplicity. View the finer details or the broader picture with the zoom feature, and download this graph as SVG or PNG for anytime access.

See it in action: Related Link

Feature 3: Presenting Gas Analysis

Phalcon’s Gas Analysis tool allows for precise inspection of each call’s Gas consumption and offers fast, intuitive analysis via flame graphs. This invaluable feature is a must-have for security researchers and developers.

With Gas Analysis Feature of Phalcon, developers can optimize and reduce gas usage, lowering transaction execution costs. For security researchers, the core attack logic in complex attack transactions is often the most gas-consuming.

See it in action: Related Link

Feature 4: Presenting State Changes

Phalcon analyzes state changes before and after transactions, providing insights into these changes with parsing reliability and accuracy that far surpass other tools.

In the recent Tornado Cash Dao attack incident, using State Changes can quickly detect malicious proposals to directly change the locked Balance in Governance for 100 addresses.

See it in action: Related Link

Feature 5: Presenting Invocation Flow

Phalcon provides a tree-structured sequence of function calls in transactions. We’ve developed many tools to boost analysis efficiency for developers and security researchers. Let’s Dive into the details!

  1. Layout

The top toolbar features filters, switches for Static Call and Gas used, and a Debug entry. You can expand to a specific level for complex transactions, and line numbers on the left provide quick navigation. On the right, the call trace tree presents function calls and events with in-depth data.

  1. Address Tags and Highlight Feature

Each address has the following tools: Copy / Add Label / Highlight / Go to *Scan (Like Etherscan).

Highlighting is a very useful feature, it marks the caller and the address appearing in the parameters.

  1. Calldata Feature

The calldata is displayed with line breaks at function selector + 64*n, helping you to view parameters in a structured way. Clicking the copy button at the bottom allows you to copy the raw data (excluding line breaks).

  1. Start Debugging from a selected line or share it with others

Select a line to start debugging from this line or share it with other users. The URL will contain the line number, and other users will be directly taken to the corresponding line when they open it.

Feature 6: Presenting Powerful Transaction Debugging

Phalcon provides the jump-level debug to analyze the transaction. Here are 4 powerful features.

  1. Multi-grained debugging with a global view and local view
  1. Seamless interaction between debug view and normal view
  1. Clearly display parameters and return value
  1. Double the debugging efficiency with dual-screen

Feature 7: Presenting Transaction Simulation

Phalcon provides an industry-leading simulator that is both convenient and fast. To use the simulator, click on the “Simulator” button in the upper right corner, adjust the parameters to your liking, and then re-simulate.

We are excited to announce that a significant upgrade is coming soon. Stay tuned for more information!

We hope this overview of Phalcon’s 7 key features has been helpful in showcasing the power and flexibility of this innovative security suite. With the strong technical and market expertise of our development team, we were able to launch Phalcon in just 8 months. We’re confident that we can continue to provide deep and diverse product experiences for our users, while maintaining a focus on security and efficiency.

Thanks again for joining our “7 Days of Phalcon” journey, and stay tuned for more exciting updates and insights from the Phalcon team! By the way, Be sure to keep an eye out for our upcoming performance at #ETHBelgrade — we can’t wait to show you what we’ve got!

Follow us for more information:

Official Website: https://blocksec.com/phalcon

Official Twitter: https://twitter.com/phalcon_xyz

Sign up for the latest updates
The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis
Security Insights

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis

This BlockSec deep-dive analyzes the KelpDAO $290M rsETH cross-chain bridge exploit (April 18, 2026), attributed to the Lazarus Group, tracing a causal chain across three layers: how a single-point DVN dependency enabled the attack, how DeFi composability cascaded the damage through Aave V3 lending markets to freeze WETH liquidity exceeding $6.7B across Ethereum, Arbitrum, Base, Mantle, and Linea, and how the crisis forced decentralized governance to exercise centralized emergency powers. The article examines three parameters that shaped the cascade's severity (LTV, pool depth, and cross-chain deployment count) and provides an exclusive technical breakdown of Arbitrum Security Council's forced state transition, an atomic contract upgrade that moved 30,766 ETH without the holder's signature.

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026

This BlockSec weekly security report covers four attack incidents detected between April 13 and April 19, 2026, across multiple chains such as Ethereum, Unichain, Arbitrum, and NEAR, with total estimated losses of approximately $310M. The highlighted incident is the $290M KelpDAO rsETH bridge exploit, where an attacker poisoned the RPC infrastructure of the sole LayerZero DVN to fabricate a cross-chain message, triggering a cascading WETH freeze across five chains and an Arbitrum Security Council forced state transition that raises questions about the actual trust boundaries of decentralized systems. Other incidents include a $242K MMR proof forgery on Hyperbridge, a $1.5M signed integer abuse on Dango, and an $18.4M circular swap path exploit on Rhea Finance's Burrowland protocol.

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026

This BlockSec weekly security report covers four DeFi attack incidents detected between April 6 and April 12, 2026, across Linea, BNB Chain, Arbitrum, Optimism, Avalanche, and Base, with total estimated losses of approximately $928.6K. Notable incidents include a $517K approval-related exploit where a user mistakenly approved a permissionless SquidMulticall contract enabling arbitrary external calls, a $193K business logic flaw in the HB token's reward-settlement logic that allowed direct AMM reserve manipulation, a $165.6K exploit in Denaria's perpetual DEX caused by a rounding asymmetry compounded with an unsafe cast, and a $53K access control issue in XBITVault caused by an initialization-dependent check that failed open. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.