Live on Localnet

Dependable Compute.
Financially Enforced.
Independently verifiable.

Security by stake. Pricing by competition.

Cluster availability is derived from deployed on-chain program IDs.

99.9%

Consensus Rate

<150ms

Avg Settlement

2.5M+

Jobs Executed

How It Works

Redundant execution by staked workers. Incorrect results lose money.

Deterministic WASM

Multiple workers execute identical WASM bytecode. Same input always produces same output. Consensus proves correctness.

💎

Staking Enforces Quality

Workers stake capital to participate. Incorrect outputs result in slashed stake. Financial consequences enforce honest execution.

📊

Market-Driven Pricing

Workers compete for jobs. Supply and demand determine fees. Capital flows to the most efficient operators.

🔐

Cryptographic Settlement

Execution proofs settle on Solana with immutable records and deterministic payout accounting.

⚔️

Slashing Protection

Redundant execution prevents single points of failure. Malicious behavior is penalized on-chain.

🛠️

Universal WASM

Compile from Rust, C, Go, and more into deterministic WASM jobs.

Get Started

Run real browser-side bulk Solana address generation here first. Then move to distributed workflows with the same command model.

browser terminal (local mode)

edgerun browser terminal

type: help

example: address local --seed-hex 0707070707070707070707070707070707070707070707070707070707070707 --prefix So --start 0 --end 50000

$

Built for Diverse Workloads

From AI inference to data processing, Edgerun handles WASM-compatible workloads.

AI/MLInference

Machine Learning Inference

Run ML models with verifiable outputs.

DataETL

Data Processing Pipelines

Process datasets with cryptographic guarantees.

Web3Oracles

Smart Contract Oracles

Provide off-chain computation results on-chain.

MediaProcessing

Image & Video Processing

Transform media with verifiable outputs.

CryptoSecurity

Cryptographic Operations

Execute heavy cryptographic workloads.

ScienceResearch

Scientific Computing

Run deterministic simulation workloads.

Ready to Start Running Verifiable Compute?

Follow the Get Started guide to run the complete workflow with clear security tradeoffs and deployment steps.