Условия использования

Before You Start

Confirm written authorization, use controlled proxies, use synthetic/anonymized data, respect third-party service terms.

You Must Not

Bypass anti-abuse mechanisms without permission, collect third-party credentials or personal data, resell access, engage in spam or fraud.

Incident & Abuse Handling

Immediately pause anomalous tasks and notify support team.

Security Hygiene

Encrypt and store credentials securely, rotate regularly, maintain detailed logging.

Publication & Sharing

Document defensive goals, redact partner data, respect embargo agreements.