Phalcon supports the debugging of a transaction, a powerful feature that can significantly improve the analysis efficiency for complex transactions. In the following, we will use the transaction of the exploitation of the Euler protocol to illustrate this feature.
Click the link for this transaction: https://phalcon.xyz/tx/eth/0xc310a0affe2169d1f6feec1c63dbc7f7c62a887fa48795d327d4d2da2d6b111d
There are two different ways to enter the debug mode. The first one is entering the debug mode from a specific line in the invocation flow view, and the second one is clicking the Debug button.
The Invocation Flow in Phalcon provides a view that lets users take a complete picture of the hack transaction and identify possible exploitation locations. This is useful when hundreds of external calls and events are included in the transaction.
In the case of the Euler protocol exploitation, the hack transaction consists of many steps, including
borrowing Flashloan from Aave,
depositing Dai into the Euler protocol, etc. But in one of the steps, the exploiter called
donateToReserves() to "donate" a massive fund to the Euler protocol, which warrants our vigilance. In this case, we can directly debug the transaction from this step by clicking the debug icon.
Another way to enter the debug mode is by clicking the Debug button in the upper right corner.
After entering the Debug mode, we can see the following screen.
This screen has five panels, which are as follows.
Sometimes, the source code panel does not show the code. It’s because the panel shows the call site of the function by default. Due to the reason that the hacking contract is not unverified (not open-sourced), the source code cannot be shown.
eDai contract is verified, so we can Step In to see the specific implementation of
donateToReserves(). After clicking Step In, the current line becomes the call site inside the
eDai contract. It’s a proxy contract, and the code is shown in the following.
After Step In again, we can finally see the concrete implementation of
The debug console is to help understand the detailed call trace, including the internal function call (The Jump at the first of a line refers that this is an internal call). Note that the Call Trace Panel does not have an internal call trace.
To traverse between the detailed execution, Phalcon provides four buttons on the Debug Console, and Next and Previous have slightly different logic under the two colors.
For instance, we can click the Next button to analyze the implementation of
donateToReserves(). We can find that the hacker donated 100 million eDAI, making the eDAI less than the dDAI and eligible for liquidation. Therefore, the root cause is that
donateToReserves() lacks liquidity check for eligible liquidation, and the exploiter liquidated himself/herself and took out 38 million
The debug of a transaction can be shared directly via URL, which contains the trace’s row number. When others open the link, the same debug view will be shown. This is useful when you want to share the analysis result with others. Team members can use this to collaborate, analyze and discuss together!
In summary, the typical workflow of using Phalcon Debuge to analyze a hack transaction is as follows.
Phalcon Debug has many features to help you improve efficiency.