Back to Blog

Phalcon Debug Transaction: Step-by-Step Guide to Analyze Efficiently

Phalcon SecurityMetaSleuth
March 29, 2023
6 min read

Phalcon Debug makes transaction analysis much easier when a transaction is too complex to understand from the surface view alone. Instead of stopping at a high-level transaction trace, it lets users step into the execution flow, inspect verified code, and follow internal logic in detail. That makes it especially useful for exploit analysis, root-cause investigation, and team collaboration.

In this guide, we use the Euler protocol exploit transaction as an example. The goal is to show how Phalcon Debug helps users move from a suspicious transaction step to a clear explanation of what happened and why it mattered.

You can open the transaction directly here: Phalcon transaction page

How to Enter Debug Mode

There are two main ways to enter debug mode in Phalcon.

The first is from a specific row in the Invocation Flow view. The second is through the Debug button in the upper right corner of the transaction page. Both lead to the same debugging environment, but starting from the Invocation Flow is often more useful when you already see a suspicious step and want to jump in at that exact point.

In the Euler exploit example, the transaction contains many steps, including borrowing a flash loan from Aave and depositing DAI into Euler. One especially suspicious step is the call to donateToReserves(), where the attacker donates a very large amount to the protocol. That is the kind of action that often deserves deeper review, and Phalcon Debug lets users start analysis right there.

Debug View Layout
Debug View Layout

Debug View Layout

After entering debug mode, Phalcon shows a workspace built for step-by-step transaction analysis. The layout includes five core panels.

The Call Trace Panel shows the trace of external calls and events. The Source Code Panel shows the source code of the current contract and highlights the relevant line. The Debug Console provides call-level step controls. The Debug Trace Panel shows the current contract call stack with both internal and external calls. The Parameters & Return Values Panel shows inputs and outputs for the current call.

This layout is useful because users do not need to jump between several tools just to understand one part of the transaction. They can read the trace, inspect code, and follow execution logic in one place.

Sometimes the source code panel may not show code. That usually happens when the current call points to an unverified contract. In this Euler case, the attacker contract is not verified, so the source code is not available there. But the eDai contract is verified, which means users can Step In and continue the analysis inside verified logic.

Debug mode when the contract is verified
Debug mode when the contract is verified

After stepping into the verified eDai contract, users can move deeper into the implementation of donateToReserves() and inspect the exact code path behind the suspicious transaction step.

Debug the donateToReserves()
Debug the donateToReserves()

How to Use the Debug Console

The debug console is designed to help users move through transaction execution in detail. This is important because the Call Trace Panel only shows external calls and events. It does not show internal function calls. The debug console fills that gap.

Phalcon provides several navigation controls in this panel. Next and Previous each have two versions. The red buttons move through the full call trace, while the blue buttons move within the current function. Step In moves into the callee function. Step Out returns to the call site of the current function.

With these controls, users can move through contract logic line by line and understand how state changes happened. In the Euler case, this helps reveal the deeper issue behind donateToReserves(). The analysis shows that the attacker donated 100 million eDAI, which changed the relationship between eDAI and dDAI and made the position eligible for liquidation. The root cause was that donateToReserves() lacked a liquidity check for eligible liquidation, allowing the attacker to liquidate and extract value.

That is where Phalcon Debug becomes more than a viewer. It becomes a practical transaction analysis tool for finding root causes inside contract execution.

Debug View Layout
Debug View Layout
Root causes of the Euler exploitation
Root causes of the Euler exploitation

Get Started with Phalcon Security

Detect every threat, alert what matters, and block attacks.

Try now for free

Debug View Sharing

Another useful feature is that a debug view can be shared directly by URL. The shared link includes the selected trace row, so when another user opens it, they see the same debug view immediately.

This is especially useful for security teams. Instead of writing a long explanation or asking a teammate to reproduce the same view manually, one analyst can share the exact context. That makes collaboration much faster during incident analysis or internal reviews.

A typical workflow looks like this. First, find a suspicious step in the Invocation Flow. Second, use debug mode to inspect code, internal calls, and parameters. Third, share the exact debug view with teammates so they can review the same context and continue the discussion.

Other Useful Features

Phalcon Debug includes a few extra features that improve analysis efficiency.

The Call Trace View can show full parameters when the parameter switch is turned on. That helps users inspect richer context without opening every step one by one.

For external calls, users can also click Rawdata to inspect the raw call parameters. This is useful when decoded data is not enough or when users want to verify how calldata was actually structured.

These details may seem small, but they save a lot of time during real analysis. For exploit investigation, audit work, or contract review, small workflow improvements often make a big difference.

Parameters switch
Parameters switch

For teams that want to go beyond one transaction and trace how assets moved across a broader attack path, MetaSleuth is a natural next step. It helps investigators follow funds across addresses and entities after the transaction-level root cause becomes clear.

Explore MetaSleuth Investigation

Trace flows and build evidence for investigations

Try now for free

Phalcon Debug is most useful when a transaction is too complex for a surface-level read but still needs a clear explanation. It helps users move from a suspicious trace entry to the actual code path, internal logic, and root cause. That makes it valuable not only for security research, but also for incident review, exploit analysis, and smart contract assessment. For teams that want to strengthen code before deployment, this same mindset naturally connects to Smart Contract Audit and Infrastructure Audits, where complex behavior is reviewed before it becomes a live risk.

Sign up for the latest updates
Building a Secure Stablecoin Payment Network: BlockSec Partners with Morph
Partnership

Building a Secure Stablecoin Payment Network: BlockSec Partners with Morph

BlockSec has partnered with Morph as an official audit partner for the $150M Morph Payment Accelerator. By offering exclusive discounts on smart contract audits and penetration testing, BlockSec provides institutional-grade security to payment builders, ensuring a safe and resilient foundation for the future of global stablecoin payments.

Weekly Web3 Security Incident Roundup | Mar 9 – Mar 15, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 9 – Mar 15, 2026

This BlockSec weekly security report covers eight DeFi attack incidents detected between March 9 and March 15, 2026, across Ethereum and BNB Chain, with total estimated losses of approximately $1.66M. Incidents include a $1.01M AAVE incorrect liquidation caused by oracle misconfiguration, a $242K exploit on the deflationary token MT due to flawed trading restrictions, a $149K exploit on the burn-to-earn protocol DBXen from `_msgSender()` and `msg.sender` inconsistency, and a $131K attack on AM Token exploiting a flawed delayed-burn mechanism. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.

Venus Thena (THE) Incident: What Broke and What Was Missed

Venus Thena (THE) Incident: What Broke and What Was Missed

On March 15, 2026, an attacker bypassed the THE (Thena) supply cap on Venus Protocol (BNB Chain) through a donation attack, inflating a collateral position to 3.67x the intended limit and borrowing ~$14.9M in assets. Both sides lost money on-chain: Venus was left with ~$2.15M in bad debt after 254 liquidation bots competed across 8,048 transactions, while the attacker retained only ~$5.2M against a $9.92M investment. This deep dive examines what broke across three lines of defense (exposure limits, collateral valuation, and liquidation) and the monitoring gaps that left months of on-chain warning signals unacted upon.

Get Real-Time Protection with Phalcon Security

Audits alone are not enough. Phalcon Security detects attacks in real time and blocks threats mid-flight.

phalcon security

Go Deeper with MetaSleuth Investigation

Extend your crypto compliance capabilities with Blocksec's MetaSleuth Investigation, the first platform for tracing funds, mapping transaction networks and revealing hidden on-chain relationships.

Move from detection to resolution faster with clear visual insights and evidence-ready workflows across the digital assets ecosystem.

MetaSleuth Investigation