Now in Public Beta

Dependable Compute.
Financially Enforced.

Security by stake. Pricing by competition.

99.9%

Consensus Rate

<150ms

Avg Settlement

2.5M+

Jobs Executed

How It Works

Redundant execution by staked workers. Incorrect results lose money. Competitive workers set the price.

Deterministic WASM
Multiple workers execute identical WASM bytecode. Same input always produces same output. Consensus proves correctness.
💎
Staking Enforces Quality
Workers stake capital to participate. Incorrect outputs result in slashed stake. Financial consequences ensure honest execution.
📊
Market-Driven Pricing
Workers compete for jobs. Supply and demand determine fees. No fixed pricing. Capital flows to the most efficient.
🔐
Cryptographic Settlement
Execution proofs settle on Solana. Immutable record of consensus. Payments distributed automatically on-chain.
⚔️
Slashing Protection
Redundant execution prevents single points of failure. Byzantine fault tolerance. Malicious workers lose stake.
🛠️
Universal WASM
Compile from any language to WASM. Rust, C, Go, AssemblyScript. Run anything deterministically.

Try the CLI

Interactive terminal demo. Watch commands execute or type your own.

edge-cli v1.0.0

Welcome to Edgerun CLI

Type `help` for available commands

Tip: Auto-play demo running... or type your own commands

$|

Built for Diverse Workloads

From AI inference to data processing, Edgerun handles any WASM-compatible workload

AI/MLInference
Machine Learning Inference

Run ML models with verifiable outputs. Perfect for decentralized AI applications requiring proof of inference.

DataETL
Data Processing Pipelines

Process large datasets with cryptographic guarantees. Transform, validate, and aggregate data trustlessly.

Web3Oracles
Smart Contract Oracles

Provide off-chain computation results to smart contracts with cryptographic proofs of correct execution.

MediaProcessing
Image & Video Processing

Resize, filter, and transform media files with verifiable outputs for content integrity verification.

CryptoSecurity
Cryptographic Operations

Execute complex cryptographic computations like ZK proofs, encryption, and signature verification.

ScienceResearch
Scientific Computing

Run simulations and numerical computations with reproducible results and cryptographic verification.

Ready to Start Running Verifiable Compute?

Join developers building the future of trustless computation. Get started in minutes with our SDK and CLI tools.