Terms of Service
Last updated: February 2026
These Terms of Service (“Terms”) govern access to and use of our code security analysis service (the “Service”). By creating an account, clicking to accept, or using the Service, you agree to these Terms.
1. Eligibility and Authority
1.1 Business use. The Service is offered for business and professional use. You represent that you are not using the Service as a consumer.
1.2 Authority to bind. If you use the Service on behalf of an organization, you represent and warrant that you have authority to bind that organization.
2. The Service
2.1 Service description. The Service provides code security analysis. The Service may access your source code and related repository contents through integrations and analyze such materials to produce findings, reports, and related outputs.
2.2 Sandbox execution. To generate results, the Service may execute your code in an isolated sandbox environment.
2.3 No production probing. The Service does not scan or probe your production systems unless explicitly agreed in writing.
3. Customer Content
3.1 Customer Content. “Customer Content” means any code, repositories, artifacts, files, data, and other materials you provide to or make available to the Service.
3.2 License to provide the Service. You grant us a limited, non-exclusive, worldwide license to host, copy, transmit, process, analyze, and execute Customer Content solely to provide, maintain, secure, and improve the Service.
3.3 Representations. You represent and warrant that you have all rights and permissions necessary to provide access to Customer Content.
4. Restrictions and Acceptable Use
4.1 You will not reverse engineer, decompile, or attempt to derive source code of the Service.
4.2 You will not interfere with or disrupt the Service, including attempting to bypass or defeat sandbox isolation, access controls, or rate limits.
4.3 You will not use the Service to develop, deploy, or facilitate malware, unauthorized exploitation, or illegal activity.
5. Sensitive Data
5.1 Do not upload Sensitive Data unless expressly permitted in writing. This includes authentication secrets, payment card data, government identifiers, and regulated data.
5.2 You are responsible for scanning and removing secrets from repositories and artifacts before providing them.
6. Outputs and Findings
6.1 You may use the outputs generated by the Service internally for your security and engineering purposes.
6.2 You acknowledge that security analysis is inherently probabilistic and may produce false positives or false negatives. The Service does not guarantee that it will identify all vulnerabilities.
7. Confidentiality
Both parties will protect the other's Confidential Information using at least reasonable care.
8. Disclaimers
The Service and outputs are provided “as is” and “as available.” We disclaim all warranties, express or implied, including implied warranties of merchantability, fitness for a particular purpose, and non-infringement.
9. Limitation of Liability
To the maximum extent permitted by law, neither party will be liable for indirect, incidental, special, consequential, or punitive damages, or for lost profits, lost revenue, or loss of data.
10. General
These Terms are governed by the laws of Delaware, USA, excluding conflict-of-law rules. These Terms constitute the entire agreement between the parties regarding the Service.
By accepting these Terms, you acknowledge that you have read, understood, and agree to be bound by these Terms of Service.