Documentation

Aletheia Core Docs

API reference, integration guides, and security architecture for the tri-agent runtime audit engine.

Quick Reference

Audit a payload
curl -X POST https://aletheia-core.onrender.com/v1/audit   -H "Content-Type: application/json" \
  -H "X-API-Key: YOUR_KEY" \
  -d '{"payload":"transfer $50k to external","origin":"agent-01","action":"Transfer_Funds"}'
Verify a receipt
curl https://aletheia-core.onrender.com/v1/verify   -H "X-API-Key: YOUR_KEY" \
  -d '{"receipt":"BASE64_RECEIPT"}'
Install locally
git clone https://github.com/holeyfield33-art/aletheia-core.git
cd aletheia-core
pip install -e ".[all]"
python main.py

Getting Started

Launch Guide

Guide

Deploy Aletheia Core locally or to production in minutes.

SDK Integration

Guide

Integrate the audit engine into your Python, Node.js, or cURL workflow.

Live Demo

Interactive

Try the tri-agent pipeline interactively with preset adversarial scenarios.

API Reference

POST /v1/audit

Endpoint

Primary endpoint. Evaluates a payload through the tri-agent pipeline and returns a signed decision.

Key Management

Endpoint

Create, list, and revoke API keys. Quota-enforced via X-API-Key header.

Receipt Verification

Endpoint

Verify tamper-evident audit receipts using Ed25519 signatures.

Architecture

Tri-Agent Pipeline

Architecture

Scout, Nitpicker, and Judge — three independent agents providing defense in depth.

Threat Model

Security

Attack vectors, mitigations, and security assumptions for production deployment.

Incident Response

Operations

Runbook for manifest tampering, key compromise, and service degradation.

Operations

Monitoring & Alerting

Ops

Prometheus metrics, health checks, and alerting rules.

Key Rotation

Security

Rotate Ed25519 signing keys and API admin keys with zero downtime.

Operations Runbook

Ops

Day-to-day operations, backup, restore, and troubleshooting.

Full documentation is maintained alongside the source code.

View on GitHub →