Acceptable Use Policy
Last Updated: April 7, 2026. This policy outlines the permissible use of SysPals infrastructure auditing tools.
1. Authorized Auditing Only
You may only use SysPals to audit infrastructure, nodes, and clusters for which you have explicit, documented authorization to perform security assessments. Using SysPals to scan third-party systems without permission is a violation of international law and will result in immediate account termination.
2. Prohibited Activities
- Reverse Engineering: You may not attempt to reverse engineer the AI auditing engine or any underlying proprietary algorithms.
- Service Overloading: Systematic automation designed to overload our audit APIs or bypass rate limits is prohibited.
- Malicious Intent: Using SysPals findings to facilitate attacks or distribute malware is strictly forbidden.
- Credential Theft: Any attempt to use SysPals to harvest SSH keys or sensitive system credentials from other users' integrations.
3. Resource Management
SysPals reserves the right to throttle or suspend accounts that consume excessive computational resources beyond the scope of standard enterprise or personal usage patterns.
4. Enforcement
Violations of this policy may result in the suspension of your service, deletion of your data, and, where appropriate, referral to legal authorities.
5. Reporting Violations
If you suspect a violation of this policy or a security vulnerability within SysPals itself, please report it immediately to security@syspals.com.