The only browser agent that produces a cryptographically signed action chain. Every navigation, extraction, and form interaction — signed, hash-chained, auditable. On your hardware. Under your policy.
Lens starts from Brave's hardened Chromium build, then rebuilds the security layer above it as our own: a sovereign sandbox, a policy-enforced network layer, and a Knox-signed audit chain. The browser foundation is open source. The architecture that makes it auditable — and admissible in a procurement audit — is ours.
AI agents browse under a declared policy: allowlisted domains, no SSRF, resource-capped subprocess. Navigation, form submission, and multi-step workflows execute within those constraints.
Parse any rendered page — including JavaScript-heavy SPAs — into structured JSON. CSS-selector and XPath targeting; attribute extraction; raw HTML capture for downstream processing.
Every HTTP request monitored, logged, and filterable. Request allowlisting, SSRF protection, external call blocking.
Document any page state for compliance and audit. Full page captures, selected element snapshots, PDF generation.
Enhanced data collection capabilities. Load extensions in Chromium 112+ headless mode (--headless=new); capture instrumented interactions across page loads.
Every browser instance runs in an isolated container. No internal network access. Only approved domains accessible. Full audit trail of every navigation, click, and data extraction.
RFC 1918 ranges (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16), loopback (127.0.0.0/8), and cloud metadata link-local (169.254.0.0/16) blocked by default. IPv6 equivalents included. Configuration override available for authorized use.
Only approved domains accessible. Whitelist mode or regex patterns. Block tracking, analytics, third-party scripts by policy.
Browser runs as non-root inside a Docker container with --no-new-privileges and a restrictive seccomp profile. Resource limits (CPU, memory, disk) enforced via cgroup v2. Automatic cleanup on session end.
Every navigation, click, and extraction is Ed25519-signed and appended to Knox's hash-chain — not a log file, a tamper-evident receipt. Admissible in procurement audits. Replayable action-by-action.
Lens connects to Echo, Crown, Atlas, and Knox as a core tool. Every extraction is Knox-attested before it enters Crown — meaning the knowledge graph carries cryptographic provenance for every web-sourced fact.
Agent asks for web data. Tower policy validates the route class and target domains.
SignedSandboxed browser navigates, extracts, and validates. Every action Knox-signed in flight.
HashedKnox appends the final hash-chained receipt. Crown ingests with full provenance lineage.
ArchivedLens runs on your hardware, in your environment. Docker-based deployment. Integration with CASTLE orchestration layer.
# CLI in private beta — request access below
$ axe deploy lens \
--namespace production \
--replicas 8 \
--resource-limit cpu=2,memory=4Gi \
--allowlist-domains procurement.gc.ca,contracts.ca \
--ssrf-mode deny-all \
--audit-log /var/log/lens/audit.jsonl
# Lens now handling browser automation requests
# All data stays on your hardware
/ Contact · we read every inquiry
.Demos, pilot deployments, government RFPs, technical questions. A person reads every inquiry.
AXE Concierge · live
Answered by a local model · Canadian iron · zero external API