Version main
Address Generator CLI
edgerun-apps/solana-address-address-generator/edgerun-address-client/README.mdx @ HEAD
edgerun-address-client
Client-side orchestrator for escrow-bounded address-prefix search on edgerun.
It supports two modes:
secure-local(default): no seed material leaves client.distributed-insecure: submits chunked jobs to scheduler (workers can derive key material from submitted seed).
Build
cargo build -p edgerun-address-client
Run (secure, default)
cargo run -p edgerun-address-client -- \
--mode secure-local \
--seed-hex 0101010101010101010101010101010101010101010101010101010101010101 \
--prefix So1 \
--start-counter 0 \
--end-counter 1000000 \
--chunk-attempts 50000
Run (distributed, insecure)
Security warning: distributed-insecure is for demo/testing only. It requires
--allow-worker-seed-exposure because worker-side search leaks derivation
material.
cargo run -p edgerun-address-client -- \
--mode distributed-insecure \
--allow-worker-seed-exposure \
--scheduler-url http://127.0.0.1:8080 \
--runtime-id 0000000000000000000000000000000000000000000000000000000000000000 \
--wasm-path /var/cache/build/rust/target/wasm32-unknown-unknown/debug/edgerun_address_payload.wasm \
--seed-hex 0101010101010101010101010101010101010101010101010101010101010101 \
--prefix So1 \
--start-counter 0 \
--end-counter 1000000 \
--chunk-attempts 50000 \
--escrow-per-job-lamports 1000000 \
--max-escrow-lamports 20000000
Required flags by mode
secure-local:--seed-hex,--prefix,--start-counter,--end-counterdistributed-insecure: all above, plus:--allow-worker-seed-exposure--scheduler-url--runtime-id--wasm-path--escrow-per-job-lamports--max-escrow-lamports
Output
The client prints JSON:
found: includescounter,address,pubkey_hex,keypair_hexexhausted_range: full range scanned without matchexhausted_escrow: escrow cap reached before range complete
Onboarding
For end-to-end onboarding (minimal and optional hardened workflow), see
docs/ONBOARDING.mdx.