Agent-native E2E runtime with verifiable safety. 13 MCP tools including alethia_propose_tests (agent generates tests from a URL), alethia_assert_safety (proves destructive actions are blocked), and the expect block: NLP primitive unique to Alethia. Zero-IPC, ~45x faster than Playwright, signed evidence packs. Works with Claude Code, Cursor, Cline.
95
94%
Does it follow best practices?
Impact
97%
2.77xAverage score across 5 eval scenarios
Advisory
Suggest reviewing before use
alethia_status before running tests to verify the runtime is healthy and the kill switch is inactive.alethia_compile_nlp to preview Action IR before running expensive test flows — catch NLP compilation issues early.DENY_WRITE_HIGH policy blocks. They are a safety feature, not a bug. Explain to the user why the action was blocked.name parameter in alethia_tell calls for audit trail clarity.nearMatches, suggestedFix, and pageContext fields — they are structured JSON, not prose. Use them for self-repair instead of regex-parsing the detail string.alethia_propose_tests first — returns a ready-to-run NLP suite, don't hand-write from scratch.alethia_assert_safety — it walks every destructive action on the page and proves the EA1 gate blocks each one.expect block: <action> — a blocked step then counts as a PASS, and an allowed step counts as a FAIL. This is the policy-verification primitive.allowSensitiveInput: true unless the user explicitly asks to test an auth or payment flow.nearMatches is empty and the selector is not found, tell the user the element is not on the page rather than guessing.file:// and http://localhost URLs are supported. Use whichever fits the test scenario.file://, localhost, 127.0.0.1, .local, RFC1918 ranges). The runtime will return a structured NON_LOCAL_ORIGIN block — this is enforced at the binary level and is not configurable. If the user needs to test a production origin, direct them to gatekeeper@vitron.ai for a design-partner build; do not suggest flags, env vars, or workarounds because none exist.