Back to Blog

Phalcon Debug Transaction: Step-by-Step Guide to Analyze Efficiently

Phalcon SecurityMetaSleuth
March 29, 2023
6 min read

Phalcon Debug makes transaction analysis much easier when a transaction is too complex to understand from the surface view alone. Instead of stopping at a high-level transaction trace, it lets users step into the execution flow, inspect verified code, and follow internal logic in detail. That makes it especially useful for exploit analysis, root-cause investigation, and team collaboration.

In this guide, we use the Euler protocol exploit transaction as an example. The goal is to show how Phalcon Debug helps users move from a suspicious transaction step to a clear explanation of what happened and why it mattered.

You can open the transaction directly here: Phalcon transaction page

How to Enter Debug Mode

There are two main ways to enter debug mode in Phalcon.

The first is from a specific row in the Invocation Flow view. The second is through the Debug button in the upper right corner of the transaction page. Both lead to the same debugging environment, but starting from the Invocation Flow is often more useful when you already see a suspicious step and want to jump in at that exact point.

In the Euler exploit example, the transaction contains many steps, including borrowing a flash loan from Aave and depositing DAI into Euler. One especially suspicious step is the call to donateToReserves(), where the attacker donates a very large amount to the protocol. That is the kind of action that often deserves deeper review, and Phalcon Debug lets users start analysis right there.

Debug View Layout
Debug View Layout

Debug View Layout

After entering debug mode, Phalcon shows a workspace built for step-by-step transaction analysis. The layout includes five core panels.

The Call Trace Panel shows the trace of external calls and events. The Source Code Panel shows the source code of the current contract and highlights the relevant line. The Debug Console provides call-level step controls. The Debug Trace Panel shows the current contract call stack with both internal and external calls. The Parameters & Return Values Panel shows inputs and outputs for the current call.

This layout is useful because users do not need to jump between several tools just to understand one part of the transaction. They can read the trace, inspect code, and follow execution logic in one place.

Sometimes the source code panel may not show code. That usually happens when the current call points to an unverified contract. In this Euler case, the attacker contract is not verified, so the source code is not available there. But the eDai contract is verified, which means users can Step In and continue the analysis inside verified logic.

Debug mode when the contract is verified
Debug mode when the contract is verified

After stepping into the verified eDai contract, users can move deeper into the implementation of donateToReserves() and inspect the exact code path behind the suspicious transaction step.

Debug the donateToReserves()
Debug the donateToReserves()

How to Use the Debug Console

The debug console is designed to help users move through transaction execution in detail. This is important because the Call Trace Panel only shows external calls and events. It does not show internal function calls. The debug console fills that gap.

Phalcon provides several navigation controls in this panel. Next and Previous each have two versions. The red buttons move through the full call trace, while the blue buttons move within the current function. Step In moves into the callee function. Step Out returns to the call site of the current function.

With these controls, users can move through contract logic line by line and understand how state changes happened. In the Euler case, this helps reveal the deeper issue behind donateToReserves(). The analysis shows that the attacker donated 100 million eDAI, which changed the relationship between eDAI and dDAI and made the position eligible for liquidation. The root cause was that donateToReserves() lacked a liquidity check for eligible liquidation, allowing the attacker to liquidate and extract value.

That is where Phalcon Debug becomes more than a viewer. It becomes a practical transaction analysis tool for finding root causes inside contract execution.

Debug View Layout
Debug View Layout
Root causes of the Euler exploitation
Root causes of the Euler exploitation

Get Started with Phalcon Security

Detect every threat, alert what matters, and block attacks.

Try now for free

Debug View Sharing

Another useful feature is that a debug view can be shared directly by URL. The shared link includes the selected trace row, so when another user opens it, they see the same debug view immediately.

This is especially useful for security teams. Instead of writing a long explanation or asking a teammate to reproduce the same view manually, one analyst can share the exact context. That makes collaboration much faster during incident analysis or internal reviews.

A typical workflow looks like this. First, find a suspicious step in the Invocation Flow. Second, use debug mode to inspect code, internal calls, and parameters. Third, share the exact debug view with teammates so they can review the same context and continue the discussion.

Other Useful Features

Phalcon Debug includes a few extra features that improve analysis efficiency.

The Call Trace View can show full parameters when the parameter switch is turned on. That helps users inspect richer context without opening every step one by one.

For external calls, users can also click Rawdata to inspect the raw call parameters. This is useful when decoded data is not enough or when users want to verify how calldata was actually structured.

These details may seem small, but they save a lot of time during real analysis. For exploit investigation, audit work, or contract review, small workflow improvements often make a big difference.

Parameters switch
Parameters switch

For teams that want to go beyond one transaction and trace how assets moved across a broader attack path, MetaSleuth is a natural next step. It helps investigators follow funds across addresses and entities after the transaction-level root cause becomes clear.

Explore MetaSleuth Investigation

Trace flows and build evidence for investigations

Try now for free

Phalcon Debug is most useful when a transaction is too complex for a surface-level read but still needs a clear explanation. It helps users move from a suspicious trace entry to the actual code path, internal logic, and root cause. That makes it valuable not only for security research, but also for incident review, exploit analysis, and smart contract assessment. For teams that want to strengthen code before deployment, this same mindset naturally connects to Smart Contract Audit and Infrastructure Audits, where complex behavior is reviewed before it becomes a live risk.

Sign up for the latest updates
Newsletter - April 2026
Security Insights

Newsletter - April 2026

In April 2026, the DeFi ecosystem experienced three major security incidents. KelpDAO lost ~$290M due to an insecure 1-of-1 DVN bridge configuration exploited via RPC infrastructure compromise, Drift Protocol suffered ~$285M from a multisig governance takeover leveraging Solana's durable nonce mechanism, and Rhea Finance incurred ~$18.4M following a business logic flaw in its margin-trading module that allowed circular swap path manipulatio

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly
Security Insights

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly

This BlockSec weekly security report covers eight attack incidents detected between April 20 and April 26, 2026, across Ethereum, Avalanche, Sui, Base, HyperLiquid, and MegaETH, with total estimated losses of approximately $7.04M. The highlighted incident is the $1.3M GiddyDefi exploit, where the attacker did not break any cryptography or use a flash loan but simply replayed an existing on-chain EIP-712 signature with the unsigned `aggregator` and `fromToken` fields swapped out for a malicious contract, demonstrating how partial signature coverage turns any historical signature into a generic permit. Other incidents include a $3.5M Volo Vault operator key compromise on Sui, a $1.5M Purrlend privileged-role takeover, a $413K SingularityFinance oracle misconfiguration, a $142.7K Scallop cross-pool index injection, a $72.35K Kipseli Router decimal mismatch, a $50.7K REVLoans (Juicebox) accounting pollution, and a $64K Custom Rebalancer arbitrary-call exploit.

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026

This BlockSec weekly security report covers four attack incidents detected between April 13 and April 19, 2026, across multiple chains such as Ethereum, Unichain, Arbitrum, and NEAR, with total estimated losses of approximately $310M. The highlighted incident is the $290M KelpDAO rsETH bridge exploit, where an attacker poisoned the RPC infrastructure of the sole LayerZero DVN to fabricate a cross-chain message, triggering a cascading WETH freeze across five chains and an Arbitrum Security Council forced state transition that raises questions about the actual trust boundaries of decentralized systems. Other incidents include a $242K MMR proof forgery on Hyperbridge, a $1.5M signed integer abuse on Dango, and an $18.4M circular swap path exploit on Rhea Finance's Burrowland protocol.

Get Real-Time Protection with Phalcon Security

Audits alone are not enough. Phalcon Security detects attacks in real time and blocks threats mid-flight.

phalcon security

Go Deeper with MetaSleuth Investigation

Extend your crypto compliance capabilities with Blocksec's MetaSleuth Investigation, the first platform for tracing funds, mapping transaction networks and revealing hidden on-chain relationships.

Move from detection to resolution faster with clear visual insights and evidence-ready workflows across the digital assets ecosystem.

MetaSleuth Investigation