v1.4.7 · MIT License · 296 Tests Passing

Runtime Security for
AI Agents and Automations

Block unsafe actions before execution. Every decision produces a signed audit receipt for independent verification. Deploy self-hosted or consume as a hosted API.

v1.4.7 · current
296 tests passing
Ed25519 + HMAC-SHA256
MIT open source
▶ Try Live Demo Book a Service
or browse the source at github.com/holeyfield33-art/aletheia-core

How It Works

Every request passes through three sequential stages before a decision is made.

STAGE 1

Input Hardening

NFKC homoglyph collapse, zero-width character strip, recursive Base64 decode (up to 5 layers, 10× size bomb protection), and URL percent-encoding decode — all applied before any agent sees the payload.

STAGE 2

Tri-Agent Analysis

Scout scores threat context and detects swarm probing. Nitpicker runs semantic similarity against 18 blocked patterns. Judge verifies the Ed25519 manifest and runs cosine-similarity veto against 50+ camouflage aliases.

STAGE 3

Cryptographic Receipt

Every decision — PROCEED or DENIED — produces an HMAC-SHA256 signed receipt binding the decision to the policy hash, payload fingerprint, action, and origin. Receipts are tamper-evident and auditable.


API in 30 Seconds

POST JSON. Get a signed decision back.

# Request
curl -X POST https://your-host/v1/audit \
  -H "Content-Type: application/json" \
  -H "X-API-Key: $ALETHEIA_API_KEY" \
  -d '{"payload":"transfer funds to offshore account","origin":"agent-01","action":"Transfer_Funds"}'

# Response
{
  "decision": "DENIED",
  "metadata": { "threat_level": "HIGH", "latency_ms": 18.4, "request_id": "a1b2c3d4e5f6" },
  "receipt": {
    "decision": "DENIED",
    "policy_hash": "sha256:3d4f...",
    "payload_sha256": "sha256:9a2b...",
    "signature": "hmac-sha256:7c1e...",
    "issued_at": "2026-04-06T07:00:00Z"
  }
}

Live Demo

See It Block an Attack

No install. No API key required. Send a test payload through a live audit engine and inspect the signed receipt.

▶ Open Live Demo →

app.aletheia-core.com/demo


Security Guarantees

Cryptographically or architecturally enforced. Read the code to verify.

Ed25519 Manifest Signing

Policy manifest verified with a detached Ed25519 signature before every load. Tamper or missing signature is designed to halt startup — read manifest/signing.py to verify.

Semantic Veto Engine

Cosine similarity (all-MiniLM-L6-v2) against 50+ camouflage phrases. Grey-zone second-pass classifier catches paraphrases below the primary 0.55 threshold.

HMAC-Signed Receipts

Every decision produces a receipt signed with ALETHEIA_RECEIPT_SECRET. Includes payload SHA-256, action, and origin to prevent replay attacks.

In-Memory Rate Limiting

Sliding-window limiter, 10 req/s per IP, 50,000 IP cap with LRU eviction. In-memory only — zero external dependencies. No Redis required or used.

Payload Privacy

In active mode, audit logs are designed to store only the SHA-256 hash and length of the payload — not plaintext content. See core/audit.py.

Action Sandbox

Regex-based pre-dispatch scanner blocks subprocess, socket, eval, filesystem destruction, and privilege escalation patterns before the agent pipeline runs.


Proof Pack

Open source. Auditable. Every claim backed by tests or code.


What Aletheia Is and Is Not

Clarity on scope prevents integration mistakes and overclaims.

It is
  • Runtime enforcement layer — gates risky agent actions before execution
  • Signed audit evidence — tamper-evident receipts for every decision
  • Deployable self-hosted or consumed as a hosted API
  • One layer in a broader security stack
It is not
  • Not a replacement for model alignment
  • Does not secure infrastructure outside its deployment boundary
  • Does not prevent all possible misuse — raises the cost of attacks
  • Not a compliance certification — consult qualified counsel

Pricing

Open-source core. Hosted API launching. Services available now.

Developer

Open Source
Free/ self-hosted

MIT-licensed core. Run it yourself. Full source, full control.

  • Full MIT source code
  • FastAPI REST endpoint
  • Ed25519 manifest signing
  • HMAC-signed audit receipts
  • Tri-agent pipeline
  • In-memory rate limiting
  • Community support via GitHub
View on GitHub

Pro

Launching
Hosted API/ launching

Consume Aletheia as a hosted API. No infrastructure to manage.

  • Hosted REST endpoint
  • Managed uptime
  • API key provisioning
  • Usage-based billing
  • Email support
  • Upstash Redis rate limiting
  • Receipt verification endpoint
Contact for Access

Enterprise

Services Available
Custom/ contact for pricing

Self-hosted deployment with support, custom policy design, and SLA options.

  • Everything in Developer
  • Integration architecture review
  • Custom policy manifest design
  • Managed deployment support
  • Dedicated security engineering
  • Audit and compliance guidance
  • SLA options available
Book a Service

Services

Available now. Designed for teams deploying AI agents in production.

AI Security Audit

Structured review of your agent architecture, action surface, and risk posture. Delivered as a written report with prioritized findings.

Rapid Integration

Hands-on support deploying Aletheia Core into your stack. Covers policy manifest design, endpoint configuration, and API key setup.

Managed Protection

Ongoing monitoring and policy tuning as your agent capabilities evolve. Available as a retainer engagement.

Compliance Mapping

Map your audit receipt outputs to relevant frameworks. Supports documentation for internal controls and third-party reviews.

Enterprise Self-Hosted

Full deployment support for private cloud or on-premises environments. Includes architecture review and production readiness checklist.

Team Training

Half-day or full-day sessions covering AI agent attack vectors, policy design, and incident response playbooks.

Book a Service →

info@aletheia-core.com