Responsible Use Guidelines
Before You Start
Confirm written authorization, use controlled proxies, use synthetic/anonymized data, respect third-party service terms.
You Must Not
Bypass anti-abuse mechanisms without permission, collect third-party credentials or personal data, resell access, engage in spam or fraud.
Incident & Abuse Handling
Immediately pause anomalous tasks and notify support team.
Security Hygiene
Encrypt and store credentials securely, rotate regularly, maintain detailed logging.
Publication & Sharing
Document defensive goals, redact partner data, respect embargo agreements.