Acceptable Use Policy
Effective 2026-05-18.
Hackers Agent is a software platform for authorized defensive security research, vulnerability triage, and threat intelligence by qualified professionals. It is not a hacking tool, a “circumvention device”, or a service for attacking systems you do not own. By using Hackers Agent you agree to the rules below in addition to our Terms of Service.
1. Prohibited uses (zero tolerance)
You agree NOT to use the Service to:
- Conduct security testing against systems you do not own or do not have explicit written authorization to test (including bug-bounty programs that require enrollment).
- Develop, distribute, deploy, or assist others in distributing malware, ransomware, spyware, stalkerware, keyloggers, password crackers, or commercial offensive cyber capabilities.
- Engage in mass scanning, denial-of-service, credential stuffing, web scraping at scale, or other abusive automation against targets you do not control or operate.
- Attempt to gain unauthorized access to any account, system, network, or data, or to bypass security, authentication, rate-limit, or DRM controls of any third party.
- Harass, stalk, threaten, defame, dox, or harm any individual, or collect non-public personal data without the data subject's consent or a lawful basis.
- Violate sanctions, export-control, or anti-money-laundering law, or use the Service to facilitate weapons trafficking, child sexual exploitation material (CSAM), human trafficking, terrorism, or violence against any person or group.
- Engage in fraud, market manipulation, intellectual-property infringement, or any activity that is illegal in your jurisdiction or in the United States.
- Generate disinformation, deepfakes of real people, voice clones intended to deceive, or content designed to interfere with elections, public-health responses, or financial markets.
- Reverse-engineer, scrape, or attempt to extract our agent prompts, proprietary chains, or model weights, or use the Service to train a competing AI system.
- Resell, sub-license, or white-label the Service without a written agreement.
2. Authorization attestation
You represent that any target you submit to the Service is either:
- (a) owned by you, or
- (b) covered by a written authorization you can produce on request (penetration-test SOW, red-team engagement letter, etc.), or
- (c) part of a public vulnerability-disclosure or bug-bounty program whose scope you are operating within.
We may, at any time, demand you produce the authorization document for an investigation you initiated. Inability to produce is a material breach.
3. AI-specific use rules
- No automated abuse. Do not script the Service to circumvent rate limits, run multiple accounts to multiply a tier's quota, or auto-generate content for spam, influence-operations, or SEO manipulation at scale.
- No high-risk autonomous deployment. Do not use AI outputs as the sole basis for life-safety, medical, legal, or financial decisions without qualified human review.
- Validate before acting. AI output is probabilistic. You bear sole responsibility for verifying that any code, exploit-PoC, or remediation guidance generated by the Service is correct and safe to deploy in your environment.
- Dark-web reconnaissance carve-out. Our Dark Web TI Agent crawls Tor and onion search engines for passive intelligence-gathering on ransomware leak sites, threat-actor forums, and credential dumps. You may use it only for defensive monitoring of YOUR organization's exposure or for credentialed threat-intel research. You may not use it to purchase, broker, or facilitate access to stolen data, weapons, exploits, or illegal substances.
4. Enforcement
We may take any of the following actions in response to a violation, proportionate to severity:
- Warning + required corrective action for minor / first-time infractions where intent appears benign.
- Temporary suspension while we investigate (typically <72 hours).
- Permanent account termination without refund for serious or repeat violations, including all data loss and balance forfeiture.
- Cooperation with law enforcement — for violations of US federal law, child-safety law, or terrorism law, we may proactively report to the relevant authorities and preserve evidence pending lawful process.
5. Reporting abuse
If you witness abuse of the Service or believe an account is in violation of this policy, email abuse@hackersagent.com with as much detail as you can share (timestamps, account identifiers, observed behavior, screenshots). We treat every report seriously and respond within 2 business days.
6. Jurisdictional restrictions
You may not use the Service if you are located in, ordinarily resident in, or a national of any country or territory subject to comprehensive US sanctions (currently Cuba, Iran, North Korea, Syria, and the Crimea, Donetsk, and Luhansk regions). You may not use the Service if you are on the OFAC SDN List or any equivalent sanctions list.
7. Changes to this policy
We may update this Acceptable Use Policy as the threat landscape and our agent surface evolve. Material changes will be announced 30 days in advance via email to account holders.