Agent-native E2E runtime with verifiable safety. 13 MCP tools including alethia_propose_tests (agent generates tests from a URL), alethia_assert_safety (proves destructive actions are blocked), and the expect block: NLP primitive unique to Alethia. Zero-IPC, ~45x faster than Playwright, signed evidence packs. Works with Claude Code, Cursor, Cline.
95
94%
Does it follow best practices?
Impact
97%
2.77xAverage score across 5 eval scenarios
Advisory
Suggest reviewing before use
Alethia is the patent-pending zero-IPC E2E runtime built for AI agents. Your agent writes the tests, runs them against a real browser, and proves destructive actions are blocked by a per-step policy gate — with a cryptographic audit trail and no cloud. ~45× faster than Playwright on the localhost test loop.
npm install -g @vitronai/alethiaThe bridge auto-installs the signed headless runtime on first use. No signup, no email gate. Works with file:// pages and http://localhost dev servers.
Fork alethia-starter and point your agent at __alethia__/. Ships a 250-line SPA called Atlas and 10 .nlp test files covering CRUD, search, priority, bulk actions, keyboard shortcuts, tab filters, toast stack, export — plus the expect block: safety test. Drop-in GitHub Actions workflow + runner included.
Add to your agent's MCP config (.mcp.json, Claude Code settings, Cursor MCP, etc.):
{
"mcpServers": {
"alethia": { "command": "alethia-mcp" }
}
}| Tool | Purpose |
|---|---|
alethia_propose_tests | New in v0.2. Scan a URL and generate a candidate NLP test suite — agent bootstraps coverage in one call. Auto-wraps destructive actions in expect block:. |
alethia_assert_safety | New in v0.2. Walk every destructive action on a page and verify the EA1 policy gate blocks each one. Automated compliance proof. |
alethia_tell | Execute natural-language test instructions. ~13 ms per step. Returns per-step DOM diffs, near-matches, suggested fixes, and structured page context on every call. |
alethia_compile_nlp | Compile NL to Action IR without executing. Preview before you run. |
alethia_status | Health probe. Version, profile, kill switch state, driver stats. |
alethia_screenshot | Capture a PNG screenshot of the current page. Visual verification for agent loops. |
alethia_eval | Evaluate a JS expression in the page under test. Escape hatch for raw DOM queries. |
alethia_audit_wcag | WCAG 2.1 AA accessibility audit — 14 criteria. Section 508 compliance. |
alethia_audit_nist | NIST SP 800-53 Rev. 5 security controls audit — 11 controls across 5 families (AC, IA, SC, SI, CM). |
alethia_tell_parallel | Run multiple test flows concurrently against different URLs. |
alethia_export_session | Export signed evidence pack — SHA-256 chained proof of every agent action in this session. |
alethia_activate_kill_switch | Halt all automation immediately. Logged in audit trail. |
alethia_reset_kill_switch | Clear an active kill switch. Re-enables tell() calls. |
Send plain English instructions against any local page:
navigate to file:///path/to/demo/incident-response.html
assert CRITICAL INCIDENT ACTIVE is visible
click Acknowledge
assert Acknowledged is visible
expect block: click Delete IncidentAlethia compiles to Action IR, runs each step through the VITRON-EA1 fail-closed policy gate, executes with synchronous DOM access, and returns structured per-step results with DOM diffs, semantic page snapshot, policy audit records, and a SHA-256 integrity hash.
expect block:expect block: is an NLP assertion unique to Alethia. The step passes if the EA1 gate blocks it, fails if the gate lets it through. This turns Alethia from "a test runner" into "a verifiable-safety framework" — you can regression-test your app's safety boundary itself.
No other E2E framework can express this cleanly, because none have a policy gate to assert against.
Every alethia_tell response now returns top-level:
nearMatches — elements close to the failed selectorsuggestedFix — corrected selector the agent can retry withpageContext — { title, headings, buttons, inputs }This feeds agent self-repair loops: a mis-selected click comes back with concrete candidates the agent can choose from instead of prose it has to regex-parse.
Default profile is controlled-web:
The policy gate is in-process — agents cannot bypass it.
Everything runs on your machine. The runtime listens on 127.0.0.1:47432 (loopback only). Zero telemetry by default. The only network call is the one-time signed runtime download on first install.
Alethia refuses to navigate to any origin outside file://, localhost, 127.0.0.1, ::1, .local, and RFC1918 private ranges. The allowlist is a compile-time constant enforced at four choke points in every signed binary we ship — NAVIGATE, alethia_propose_tests, alethia_assert_safety, and the renderer-level will-navigate / will-redirect handlers. It is not exposed as a CLI flag, env var, MCP argument, policy profile, or UI toggle. Design-partner production-origin access is handled by issuing a custom-signed build with those origins baked in, never by shipping a general-purpose override. See vitron-ai/alethia/SECURITY.md.