Usage Protocol

Terms of
Engagement.

The rules governing the deployment and operation of autonomous threat intelligence agents within the ThreatBase ecosystem.

Effective Date: March 2026

1. Acceptance of Terms

By accessing or using the ThreatBase autonomous intelligence platform, API, or related services (collectively, the "Services"), you agree to be bound by these Terms of Engagement ("Terms"). If you are entering into these Terms on behalf of an enterprise, company, or other legal entity, you represent that you have the authority to bind such entity to these Terms. If you do not agree with these terms, you may not use the Services.

2. Description of Services

ThreatBase provides a software-as-a-service (SaaS) platform that enables the deployment of specialized AI agents to monitor, reason, and report on publicly available data across the surface internet. The Services are provided on a recurring subscription basis and are designed exclusively for legitimate cyber-defense, brand protection, and threat intelligence operations.

3. Acceptable Use Policy

As a condition of using ThreatBase, you agree strictly to the following parameters:

  • Lawful Purpose: You will only use the Services for lawful, defensive cybersecurity operations.
  • No Offensive Operations: You will not utilize our agents to facilitate cyber-attacks, exploitation, disruption, or unauthorized penetration testing of third-party infrastructure.
  • Public Data Scope: You understand that ThreatBase agents only process publicly available data (OSINT). You will not attempt to use the Services to bypass authentication mechanisms or access private, protected databases.
  • Platform Integrity: You will not attempt to reverse-engineer, decompile, or otherwise compromise the internal routing, agent logic, or proprietary algorithms of the platform.

Violation of this Acceptable Use Policy will result in immediate termination of your mission instances and permanent account suspension without refund.

4. Client Data and Intellectual Property

A. Your Data

You retain all rights, title, and interest in the data you provide to ThreatBase (such as configuration files and target assets). You grant ThreatBase a limited, non-exclusive license to process this data solely for the purpose of executing your intelligence missions.

B. ThreatBase Property

ThreatBase and its licensors retain all rights, title, and interest in the Services, including all software, algorithms, machine learning models, UI/UX designs, and underlying agent architecture. These Terms grant no ownership rights in the platform.

5. Limitation of Liability and Warranties

Disclaimer of Warranties: The Services are provided on an "as is" and "as available" basis. While we strive for absolute accuracy, ThreatBase makes no guarantees regarding the completeness, accuracy, or timeliness of the intelligence gathered by our autonomous agents.

Liability Cap: To the maximum extent permitted by applicable law, ThreatBase's total cumulative liability arising from or relating to these Terms or your use of the Services shall not exceed the total amount paid by you to ThreatBase in the twelve (12) months preceding the incident giving rise to the liability.

6. Term and Termination

Subscriptions are billed on a recurring basis. You may cancel your subscription at any time; however, no refunds will be provided for partial billing periods. ThreatBase reserves the right to suspend or terminate your access to the Services immediately, with or without notice, if we determine you have materially breached these Terms or our Acceptable Use Policy.

Upon termination or completion of a trial period without subscription conversion, access to the platform will be revoked, and active missions will be paused. We will retain collected intelligence in a suspended state subject to our automated data retention purging schedules discussed in our Privacy Policy.

7. Contact Information

Notices regarding legal inquiries or these Terms of Engagement should be routed to our legal counsel at:

legal@threatbase.us