Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.magicblock.gg/llms.txt

Use this file to discover all available pages before exploring further.

Solana VRF proofs are cryptographically bound to the input caller_seed and to MagicBlock’s VRF signer identity. Your callback enforces this with:
#[account(address = ephemeral_vrf_sdk::consts::VRF_PROGRAM_IDENTITY)]
pub vrf_program_identity: Signer<'info>,
Only the official MagicBlock oracle can trigger the callback, preventing spoofed or manipulated results. Invalid proofs automatically fail, and other programs cannot front-run the request. EphemeralVrf checks for conditions like InvalidProof and Unauthorized so incorrect signatures or unauthorized callers are rejected before your game logic runs. The VRF program has a published audit, so treat that report as the source of truth before going live. Avoid letting users provide the entire caller_seed directly. Combine it with game state or timestamps to prevent seed grinding. Because everything executes inside the deterministic rollup, the random value cannot be reused or delayed. This enforcement happens within the same ephemeral rollup that executes your game logic.

Security & Audits

Read the audit report and security notes.

Solana VRF

Return to the Solana VRF overview.