Hands-on code examples demonstrating Eliloda's Web3 API capabilities across storage, compute, and security.
๏ฟฝ See ExamplesExamples for uploading, retrieving, and managing NFTs and files across our global storage network.
Demonstrates secure computation requests using our WebAssembly-based execution environment.
Examples for encryption, multi-signature authorization, and zero-knowledge proof validation.
curl -X POST "https://api.eliloda.com/v3/storage/nft" -H "Authorization: Bearer YOUR_API_KEY" -H "Content-Type: application/json" -d '{ "chain": "ethereum", "tokenUri": "ipfs://Qm...", "metadata": { "name": "Digital Art #1001", "description": "Decentralized masterpiece", "attributes": [...] } }'
Store and verify NFT metadata across IPFS and blockchain networks.
curl -X GET "https://api.eliloda.com/v3/storage/retrieve/Qm..." -H "Authorization: Bearer YOUR_API_KEY" -H "Accept: application/octet-stream"
Access files stored across our distributed network with automatic redundancy selection.
curl -X POST "https://api.eliloda.com/v3/compute/job" -H "Authorization: Bearer YOUR_API_KEY" -H "Content-Type: application/json" -d '{ "code": "WASM_BYTECODE", "input": { "data": "..." }, "computeUnits": 500 }'
Run WebAssembly modules across our global compute network with transparent pricing.
curl -X GET "https://api.eliloda.com/v3/compute/jobs/JOBID" -H "Authorization: Bearer YOUR_API_KEY" -H "Accept: application/json"
Retrieve results from asynchronous compute tasks with blockchain verification.
curl -X POST "https://api.eliloda.com/v3/security/wallets/multisig" -H "Authorization: Bearer YOUR_API_KEY" -H "Content-Type: application/json" -d '{ "chain": "solana", "requiredSigners": 3, "publicKeys": ["ADDR1", "ADDR2", "ADDR3"] }'
Create secure multi-party wallets with threshold signing requirements.
curl -X POST "https://api.eliloda.com/v3/security/zero-knowledge" -H "Authorization: Bearer YOUR_API_KEY" -H "Content-Type: application/json" -d '{ "circuit": "zkWASM", "inputs": { ... }, "proofType": "groth16" }'
Generate and verify zero-knowledge proofs for private and secure transactions.
Try these examples commands in our sandbox environment or integrate them into your production systems.