Documentation
Aletheia Core Docs
API reference, integration guides, and security architecture for the tri-agent runtime audit engine.
Quick Reference
Audit a payload
curl -X POST https://aletheia-core.onrender.com/v1/audit -H "Content-Type: application/json" \
-H "X-API-Key: YOUR_KEY" \
-d '{"payload":"transfer $50k to external","origin":"agent-01","action":"Transfer_Funds"}'Verify a receipt
curl https://aletheia-core.onrender.com/v1/verify -H "X-API-Key: YOUR_KEY" \
-d '{"receipt":"BASE64_RECEIPT"}'Install locally
git clone https://github.com/holeyfield33-art/aletheia-core.git cd aletheia-core pip install -e ".[all]" python main.py
Getting Started
API Reference
POST /v1/audit
EndpointPrimary endpoint. Evaluates a payload through the tri-agent pipeline and returns a signed decision.
Key Management
EndpointCreate, list, and revoke API keys. Quota-enforced via X-API-Key header.
Receipt Verification
EndpointVerify tamper-evident audit receipts using Ed25519 signatures.
Architecture
Tri-Agent Pipeline
ArchitectureScout, Nitpicker, and Judge — three independent agents providing defense in depth.
Threat Model
SecurityAttack vectors, mitigations, and security assumptions for production deployment.
Incident Response
OperationsRunbook for manifest tampering, key compromise, and service degradation.
Operations
Full documentation is maintained alongside the source code.
View on GitHub →