Autonomous API QA agent — define actions and invariants, explore every state path automatically.
Project description
VenomQA
Autonomous QA agent that exhaustively explores APIs — define actions and invariants, let VenomQA find every bug sequence your linear tests miss.
See It In Action (30 seconds)
pip install venomqa
venomqa demo
Unit Test Results: 3/3 PASS ✓
VenomQA Exploration: 8 states, 20 transitions
╭─────────────────── CRITICAL VIOLATION ───────────────────╮
│ BUG FOUND! │
│ Sequence: create_order → refund → refund │
│ Problem: Refunded $200 on a $100 order! │
╰──────────────────────────────────────────────────────────╯
The Problem
Your unit tests check individual endpoints. Your integration tests check one happy path. Neither catches bugs that only appear in a specific sequence of calls.
PUT /refund → 200 # fine alone
PUT /refund → 200 # fine again
GET /order → 200 # refunded_amount > original_amount ← BUG
VenomQA finds these. Automatically.
How It Works
You define: VenomQA does:
┌─────────────┐ ┌─────────────────────────────────────────────┐
│ Actions │ │ │
│ (API calls)│──────────▶ │ S0 ──[create]──▶ S1 ──[update]──▶ S2 │
│ │ │ │ │ │ │
│ Invariants │ │ └──[list]──▶ S3 └──[delete]──▶ S4 │ │
│ (rules that│──────────▶ │ ✓OK ✓OK ✗FAIL! │ │
│ must hold) │ │ │
└─────────────┘ │ After every step, checks ALL invariants. │
│ Rolls back DB between branches. │
└─────────────────────────────────────────────┘
Schemathesis tests endpoints one at a time with random inputs.
VenomQA tests sequences of endpoints — the bugs that only appear after create → update → delete → create.
Why VenomQA Needs Database Access
VenomQA explores state graphs by branching:
State S0 ──[create_order]──▶ S1
│ │
│ [cancel_order]──▶ S2 (branch A)
│ │
│ [refund_order]──▶ S3 (branch B) ← BUG FOUND!
│
└──[list_orders]──▶ S4 (branch C)
To explore both branches A and B from state S1, VenomQA must:
- Execute
create_order→ reach S1 - Execute
cancel_order→ reach S2 - ROLLBACK database to S1 ← This is why you need DB access!
- Execute
refund_order→ reach S3
The database you connect must be the SAME one your API writes to. VenomQA checkpoints and rolls back THAT database.
Quickstart (Zero-Config)
VenomQA reads your project structure and runs automatically.
Requirements:
docker-compose.yml— your API + database setupopenapi.yamlorswagger.json— your API spec
pip install venomqa
venomqa # That's it. Runs autonomously.
If your API requires authentication:
venomqa --api-key YOUR_KEY # X-API-Key header
venomqa --auth-token YOUR_TOKEN # Bearer token
venomqa --basic-auth user:password # Basic auth
# Or use environment variables:
export VENOMQA_API_KEY=your-key
venomqa
What happens:
- Reads your
docker-compose.yml→ understands your stack - Spins up isolated test containers (won't touch your real database)
- Parses your OpenAPI spec → generates test actions
- Runs state hypergraph exploration → finds sequence bugs
- Reports violations → tears down containers
[1/6] Discovering project structure...
✓ Found docker-compose.yml
✓ Found openapi.yaml (47 endpoints)
✓ Detected PostgreSQL database
[2/6] Creating isolated test environment...
✓ Using random ports to avoid conflicts
[3/6] Starting containers...
✓ postgres: healthy (5432 → 54321)
✓ api: healthy (8000 → 48000)
[4/6] Generating test actions from OpenAPI...
✓ Created 47 actions
[5/6] Exploring API sequences...
┌──────────────────── CRITICAL ────────────────────┐
│ no_server_errors │
│ │
│ Server returned 5xx error │
│ │
│ Path: create_user → update_user → delete_user │
└──────────────────────────────────────────────────┘
Summary: 45 states | 200 steps | 89% coverage | 1 bug found
Advanced: Manual Configuration
For full control, configure actions and invariants manually:
Step 1: Identify Your Database
What database does your API use?
- PostgreSQL → Use
PostgresAdapter(most common) - SQLite → Use
SQLiteAdapter - In-memory / No database → Use
state_from_context(limited)
Step 2: Run Exploration
import os
from venomqa import Action, Invariant, Agent, World, DFS, Severity
from venomqa.adapters.http import HttpClient
from venomqa.adapters.postgres import PostgresAdapter
# Connect to your API's database (same one the API writes to)
api = HttpClient("http://localhost:8000")
db = PostgresAdapter(os.environ["DATABASE_URL"]) # e.g. postgresql://user:pass@localhost/mydb
# 1. Define actions using expect_* helpers (cleanest pattern)
def create_order(api, context):
resp = api.post("/orders", json={"product_id": 1, "qty": 2})
resp.expect_status(201) # raises if not 201
data = resp.expect_json_field("id", "total") # raises if fields missing
context.set("order_id", data["id"])
context.set("order_total", data["total"])
return resp
def refund_order(api, context):
order_id = context.get("order_id")
resp = api.post(f"/orders/{order_id}/refund", json={"amount": 100})
resp.expect_status(200, 201) # 200 or 201
return resp
def list_orders(api, context):
resp = api.get("/orders")
resp.expect_status(200)
orders = resp.expect_json_list() # raises if not array
context.set("orders", orders)
return resp
# 2. Define invariants (rules that must always hold)
def no_over_refund(world):
# GOOD: Make live API call to verify server state
resp = world.api.get("/orders")
if resp.status_code != 200:
return False
orders = resp.json()
return all(o.get("refunded", 0) <= o.get("total", 0) for o in orders)
# 3. Explore every reachable sequence
agent = Agent(
world=World(api=api, systems={"db": db}), # ← REQUIRED: database adapter
actions=[
Action(name="create_order", execute=create_order, expected_status=[201]),
Action(name="refund_order", execute=refund_order, preconditions=["create_order"]),
Action(name="list_orders", execute=list_orders, expected_status=[200]),
],
invariants=[
Invariant(name="no_over_refund", check=no_over_refund,
message="Refunded amount cannot exceed order total",
severity=Severity.CRITICAL),
],
strategy=DFS(), # ← Use DFS with PostgreSQL
max_steps=200,
)
result = agent.explore()
# States: 12, Violations: 1
# [CRITICAL] no_over_refund: Refunded amount cannot exceed order total
# Reproduction path: create_order → refund_order → refund_order → list_orders
No Database? Context-Based Mode
If your API is stateless or you can't access the database:
# Context-based exploration - VenomQA tracks these keys to distinguish states
world = World(
api=api,
state_from_context=["order_id", "order_count", "user_id"],
)
Validation Helpers
Use expect_* helpers in actions — VenomQA catches AssertionError as violations:
resp.expect_status(201) # raises if not 201
resp.expect_status(200, 201, 204) # raises if not any of these
resp.expect_success() # raises if not 2xx/3xx
data = resp.expect_json() # raises if not JSON
data = resp.expect_json_field("id") # raises if "id" missing, returns dict
items = resp.expect_json_list() # raises if not array
resp.status_code # returns 0 on network error (safe)
resp.headers # returns {} on network error (safe)
From OpenAPI Spec
# Generate actions from your spec, run immediately
venomqa scaffold openapi https://api.example.com/openapi.json \
--base-url https://api.example.com \
--output actions.py
python3 actions.py
# Runs BFS over all 19 endpoints, reports violations
State Graph Exploration
┌─── S0 (initial) ───┐
│ │
[create] [list]
│ │
▼ ▼
S1 S2
/ \ (pass)
[update] [delete]
/ \
S3 S4
(pass) [✗ VIOLATION]
Invariant failed:
"delete then create
returns stale state"
VenomQA checkpoints the DB before each branch and rolls back after, so every path starts from a clean slate. No test pollution between branches.
Core Concepts
| Concept | What it is |
|---|---|
Action |
A callable (api, context) → response — one API call |
Invariant |
A rule (world) → bool checked after every action |
World |
Sandbox: HTTP client + rollbackable systems + shared context |
Agent |
Orchestrates BFS/DFS exploration, handles checkpoints |
Context |
Key-value store across actions — context.set() / context.get() |
Violation |
Recorded invariant failure with severity + exact reproduction path |
Rollback Backends
| System | Mechanism |
|---|---|
| PostgreSQL | SAVEPOINT / ROLLBACK TO SAVEPOINT — entire run is one transaction |
| Redis | DUMP + FLUSHALL + RESTORE — full key restore |
| In-memory (queue, mail, storage) | Copy + restore |
| Custom HTTP | Subclass MockHTTPServer (3-method interface) |
world = World(
api=HttpClient("http://localhost:8000"),
systems={
"db": PostgresAdapter("postgresql://localhost/mydb"),
"cache": RedisAdapter("redis://localhost:6379"),
},
)
Reporters
from venomqa.reporters.console import ConsoleReporter
from venomqa.reporters.html_trace import HTMLTraceReporter
ConsoleReporter().report(result) # colored terminal output
html = HTMLTraceReporter().report(result) # D3 force-graph of the state space
open("trace.html", "w").write(html)
Working Example
examples/github_stripe_qa/ — two deliberately planted bugs that VenomQA catches automatically:
cd examples/github_stripe_qa && python3 main.py
# Bug 1: GitHub open-issues endpoint leaks closed issues [CRITICAL]
# Bug 2: Stripe allows refund > original charge amount [CRITICAL]
CLI
venomqa # auto-run if docker-compose + openapi exist
venomqa demo # see it find a bug (30 seconds)
venomqa init --with-sample # create project with examples
venomqa doctor # system diagnostics
# Authentication options
venomqa --api-key KEY # X-API-Key header
venomqa --auth-token TOKEN # Bearer token
venomqa --basic-auth user:pass # Basic auth
venomqa --skip-preflight # skip Docker/auth checks
Development
git clone https://github.com/namanag97/venomqa
cd venomqa
pip install -e ".[dev]"
make test # all unit tests
make lint # ruff
make typecheck # mypy --strict
make ci # lint + typecheck + coverage
Docs
MIT — built by Naman Agarwal
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file venomqa-0.6.3.tar.gz.
File metadata
- Download URL: venomqa-0.6.3.tar.gz
- Upload date:
- Size: 1.9 MB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
3c1ca0b3125b85a6b9d57ce20870c45e0987914fea51fdeae90053187826c018
|
|
| MD5 |
3b9a0d72d2e0a3ce44b6965f8cd96f14
|
|
| BLAKE2b-256 |
000086822d23b04e733fb1591ee27122d5c2e8954ce2fc340a8ac54ea29a2537
|
File details
Details for the file venomqa-0.6.3-py3-none-any.whl.
File metadata
- Download URL: venomqa-0.6.3-py3-none-any.whl
- Upload date:
- Size: 1.1 MB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1b278d80b03d10f54712c46bf828eff79474eaf6ad23a411a6033eefdf4ec8bc
|
|
| MD5 |
7a9e0d79bd625c9121384c15ef7ba604
|
|
| BLAKE2b-256 |
3cb6349cec6f63073af97bb620bda2e8ab9a5f462a8614c94f801dec534233bf
|