Back to Blog

Major Upgrades to BlockSec Phalcon's Storage Analysis and Monitoring Functions

Phalcon
April 30, 2024

We have made substantial improvements in handling complex data structures, enhancing Phalcon's ability to analyze and monitor nested structures, including structs, mappings, and arrays.

These advancements in storage analysis and monitoring empower developers and security researchers to better comprehend and monitor onchain activities, swiftly identifying potential security threats or misconfigurations to ensure the stability of protocols and safety of funds.

Introduction to Blockchain Storage and Its Importance

In blockchain technology, "storage" is the component that permanently retains all state and data, including the varied state data resulting from contract executions. Each blockchain transaction can alter the information stored, making storage a crucial element of the blockchain network. Robust storage analysis and monitoring capabilities are essential for developers and security researchers to effectively oversee on-chain transactions, detect potential security issues or misconfigurations promptly, thereby maintaining protocol stability and securing funds.

In the realm of contract development, developers often craft complex and nested data structures. Prior to the introduction of Phalcon, no tool existed that could monitor the variables within these intricate structures accurately without additional coding. Phalcon has revolutionized this aspect, offering tools that allow for seamless monitoring of such complex data structures.

Figure 1: Monitored Variables of Phalcon
Figure 1: Monitored Variables of Phalcon

Major Upgrade in Phalcon's Analysis Capabilities

In this upgrade, we have significantly enhanced the analysis capabilities of our blockchain explorer, particularly in handling complex data structures. We have improved the display capabilities for nested situations involving structs, mappings, and arrays. Now, users can more intuitively view and analyze the nested data structures within smart contracts. This represents a major advancement for developers, as it enables them to more accurately verify contract states and internal logic.

Using Phalcon to monitor key variables in contracts, the platform is able to:

  • Parse the values of complex variables within current contracts, assisting developers in determining whether the contract state is abnormal.
  • Configure precise monitoring for key variables, minimizing false positives and protecting funds. Alerts and pre-configured actions are triggered when key variable changes occur due to attack transactions that meet user-configured conditions.

For example, in the recent security incident involving the SaitaChain project, if developers had been monitoring the key variable _tokenOwner, any unexpected change would have triggered an immediate alert and executed a predetermined action.

Upgrades to Phalcon Explorer's Storage Change Analysis Capabilities

Complementing the upgrades to Phalcon, our supporting tool, Phalcon Explorer, has also undergone comprehensive enhancements in storage analysis, establishing themselves as leaders in blockchain analysis tools.

Whether developers are debugging transactions or security researchers are analyzing unusual transactions, Phalcon Explorer now provides clearer and more intuitive results for Storage Change, aiding developers in understanding the changes to key variables in transaction storage and helping security researchers more quickly pinpoint issues.

Example transaction: https://app.blocksec.com/explorer/tx/eth/0xdc5c56869862f7da6527ec68da9d8e1e04ccc3ca16a6b3ebe8f714432d505245

Figure 2: State Changes of Phalcon Explorer
Figure 2: State Changes of Phalcon Explorer

BlockSec continues to innovate with Phalcon, providing cutting-edge tools for project teams, developers, LPs, and security researchers, protecting their protocols and assets from security threats. Let's work together towards a safer DeFi ecosystem. 🛡️


About Phalcon

🔗 https://blocksec.com/phalcon

Figure 3: Official website of Phalcon
Figure 3: Official website of Phalcon

Phalcon is a security platform developed by BlockSec to monitor and block hacks. The system detects suspicious transactions, instantly alerts users, and takes automated actions in response.

Figure 4: Use cases of Phalcon
Figure 4: Use cases of Phalcon

Phalcon's Key Advantages:

  • Precise detection with minimal to zero FPs.
  • Monitors both hacks and operational risks like privilege changes.
  • Initiates automatic actions, with support for user-defined responses.
  • Enables code-free configuration of monitors and actions.

Phalcon is a SaaS platform where users can directly log in through our official website to view different pricing plans and features, and subscribe immediately (supporting both credit card and crypto payments). For any questions, feel free to book a demo with our security experts who will address your concerns.

Support Tool: Phalcon Explorer

Phalcon Explorer is the support tool for the Phalcon platform. This powerful transaction explorer is designed for the DeFi community. It provides comprehensive data on call flows, balance changes, and transaction fund flows, as well as supports transaction simulation. This helps developers, security researchers, and traders to more intuitively understand transactions.

Sign up for the latest updates
The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis
Security Insights

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis

This BlockSec deep-dive analyzes the KelpDAO $290M rsETH cross-chain bridge exploit (April 18, 2026), attributed to the Lazarus Group, tracing a causal chain across three layers: how a single-point DVN dependency enabled the attack, how DeFi composability cascaded the damage through Aave V3 lending markets to freeze WETH liquidity exceeding $6.7B across Ethereum, Arbitrum, Base, Mantle, and Linea, and how the crisis forced decentralized governance to exercise centralized emergency powers. The article examines three parameters that shaped the cascade's severity (LTV, pool depth, and cross-chain deployment count) and provides an exclusive technical breakdown of Arbitrum Security Council's forced state transition, an atomic contract upgrade that moved 30,766 ETH without the holder's signature.

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026

This BlockSec weekly security report covers four attack incidents detected between April 13 and April 19, 2026, across multiple chains such as Ethereum, Unichain, Arbitrum, and NEAR, with total estimated losses of approximately $310M. The highlighted incident is the $290M KelpDAO rsETH bridge exploit, where an attacker poisoned the RPC infrastructure of the sole LayerZero DVN to fabricate a cross-chain message, triggering a cascading WETH freeze across five chains and an Arbitrum Security Council forced state transition that raises questions about the actual trust boundaries of decentralized systems. Other incidents include a $242K MMR proof forgery on Hyperbridge, a $1.5M signed integer abuse on Dango, and an $18.4M circular swap path exploit on Rhea Finance's Burrowland protocol.

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026

This BlockSec weekly security report covers four DeFi attack incidents detected between April 6 and April 12, 2026, across Linea, BNB Chain, Arbitrum, Optimism, Avalanche, and Base, with total estimated losses of approximately $928.6K. Notable incidents include a $517K approval-related exploit where a user mistakenly approved a permissionless SquidMulticall contract enabling arbitrary external calls, a $193K business logic flaw in the HB token's reward-settlement logic that allowed direct AMM reserve manipulation, a $165.6K exploit in Denaria's perpetual DEX caused by a rounding asymmetry compounded with an unsafe cast, and a $53K access control issue in XBITVault caused by an initialization-dependent check that failed open. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.