Legal

Responsible Use Guidelines

Last updated: April 25, 2026

Before You Start

Confirm written authorization, use controlled proxies, use synthetic/anonymized data, respect third-party service terms.

You Must Not

Tamper with anti-abuse mechanisms without permission, collect third-party credentials or personal data, resell access, engage in spam or fraud.

Incident & Abuse Handling

Immediately pause anomalous tasks and notify support team.

Security Hygiene

Encrypt and store credentials securely, rotate regularly, maintain detailed logging.

Publication & Sharing

Document defensive goals, redact partner data, respect embargo agreements.