Terms of
Access & Operation.
By utilizing the MeshaSec Platform, you agree to the following operational boundaries and service protocols. These terms govern the use of our autonomous discovery engines and evidence reporting.
01 / Authorized Targets Only
MeshaSec is engineered to identify vulnerabilities at the protocol level. You agree to strictly use the MeshaSec platform on web applications, APIs, and infrastructure that you either own or possess explicit written authorization to test. Unauthorized use of our engine against third-party infrastructure will result in immediate termination of the node connection and may be reported to relevant authorities.
02 / Identity & Credentials
To perform authenticated scans, you will provide test credentials or session tokens. You agree to provide test-environment configurations rather than production-level administrative credentials wherever possible. You are solely responsible for the lifecycle and revocation of any credentials supplied to the MeshaSec engine.
03 / Platform Licensing & Usage
Access to the MeshaSec dashboard, orchestration APIs, and Evidence Proof links is provided via a limited, non-exclusive, non-transferable license. You may not reverse-engineer, decompile, or attempt to extract the underlying discovery logic or AI node architectures. The "Proof of Logic" screenshots and raw HTTP Request/Response data generated are yours to retain for remediation purposes.
04 / Operational Availability
While our orchestration pipelines run in highly available clusters, MeshaSec does not guarantee uninterrupted operation. We reserve the right to pause scan executions for critical engine updates or if we detect anomalous behavior that threatens the stability of the platform or the target environment.
05 / Limitation of Liability
MeshaSec provides deterministic evidence of vulnerabilities. However, the execution of dynamic testing inherently interacts with application logic. We are not liable for any data modification, service degradation, or infrastructure downtime resulting from the execution of authorized scans against your targets.
These protocols represent the current operating agreement. For legal inquiries, custom SLAs, or enterprise contract terms, direct your communications to:
legal@meshasec.com