Request Randomness
Get verifiable on-chain randomness from the X1 Randomness Protocol.
Queue Path — Entropy Pool Empty
Requests queue until the next EE V4 commit/reveal cycle completes
Request History by Address
Request On-Chain Randomness
SHA256(pool_entropy ‖ request_id ‖ slot_hash)How It Works
Generate a 32-byte seed. This personalizes your random output — two requests with the same round entropy but different seeds get different outputs.
Pay 0.01 XNT. Fees go into the round's FeeEscrow and are distributed 95% to validators / 5% to crank runner after the round.
If the pool is warm (fast path), your output is derived from existing pool entropy immediately. Otherwise, the request queues for the next EE V4 round.
Output: SHA256(pool_entropy ‖ request_id ‖ slot_hash) — the slot hash is unknown at submission time, making outputs unpredictable even with known pool entropy. Deterministic and verifiable on-chain.