This Acceptable Use Policy outlines guidelines for appropriate use of the DCYFR Labs website and services. By accessing or using our services, you agree to comply with this policy.
Last Updated: January 16, 2026
Permitted Uses
You may use our services to:
Content Consumption
- Read blog posts, technical articles, and documentation
- View project showcases and portfolio content
- Bookmark content for personal reference
- Share content via social media or direct links
Communication
- Contact us via the provided contact form
- Report bugs or accessibility issues
- Request information about services or projects
- Provide feedback on content or features
Educational Purposes
- Learn from code examples and technical guides
- Reference implementation patterns and best practices
- Use as educational material for personal learning
- Share knowledge with attribution
Research
- Analyze public content for research purposes
- Cite content with proper attribution
- Use anonymized analytics data (if publicly available)
Prohibited Uses
You may not use our services to:
Abusive Behavior
- Automated Scraping: Scrape content using bots, crawlers, or automated tools (except legitimate search engine bots)
- Rate Limit Abuse: Make excessive requests that overwhelm our infrastructure
- DDoS Attacks: Launch denial-of-service or distributed denial-of-service attacks
- Resource Exhaustion: Deliberately consume excessive bandwidth or server resources
Security Violations
- Hacking: Attempt to gain unauthorized access to systems or data
- Vulnerability Exploitation: Exploit security vulnerabilities without responsible disclosure
- Malware Distribution: Distribute viruses, malware, or malicious code
- Phishing: Impersonate DCYFR Labs or send deceptive communications
- Credential Stuffing: Use stolen credentials to access accounts
Illegal Activities
- Copyright Infringement: Reproduce content without permission (beyond fair use)
- Trademark Violations: Use DCYFR Labs marks without authorization
- Fraud: Engage in fraudulent or deceptive practices
- Illegal Content: Post or transmit illegal content
- Privacy Violations: Collect or share personal data without consent
Harmful Content
- Harassment: Harass, abuse, or threaten individuals
- Hate Speech: Post content promoting hate based on protected characteristics
- Violence: Promote or incite violence
- Misinformation: Deliberately spread false information
Technical Abuse
- Reverse Engineering: Reverse engineer, decompile, or disassemble our software (except where legally permitted)
- Circumvention: Bypass security measures, rate limits, or access controls
- Monitoring: Monitor availability or performance without authorization
- Interference: Interfere with other users' access or enjoyment of services
Rate Limits
To ensure fair use and protect our infrastructure, we enforce rate limits:
Current Limits
- Contact Form: 5 submissions per hour per IP address
- API Endpoints: 100 requests per minute per IP address (where applicable)
- Page Views: No strict limits on normal browsing
Exceeding Rate Limits
If you exceed rate limits:
- Automatic: You'll receive HTTP 429 (Too Many Requests) responses
- Temporary Block: Your IP may be temporarily blocked (15-60 minutes)
- Permanent Block: Persistent abuse may result in permanent IP blocking
Requesting Higher Limits
If you need higher rate limits for legitimate purposes:
- Contact us with your use case and requirements
- Provide details about your project and expected traffic
- We'll review and may grant exceptions on a case-by-case basis
Enforcement
Violation Response
If we detect a violation of this policy:
- Warning: First-time minor violations may result in a warning
- Temporary Suspension: Moderate violations may result in temporary service suspension (24-72 hours)
- Permanent Ban: Severe or repeated violations will result in permanent IP blocking
- Legal Action: We may pursue legal remedies for serious violations
Automated Detection
We use automated systems to detect:
- Unusual traffic patterns indicating abuse
- Known malicious IP addresses or user agents
- Security scan attempts (port scanning, vulnerability probing)
- DDoS attacks or resource exhaustion
Appeals Process
If you believe your access was restricted in error:
- Contact us with your IP address and details
- We'll review your case within 24-48 hours
- Provide evidence of legitimate use if applicable
- Appeals for security violations require additional verification
Reporting Violations
If you observe violations of this policy:
How to Report
- Submit a report via our contact form
- Include "AUP Violation Report" in the subject line
- Provide specific details about the violation
- Include timestamps and URLs if applicable
What to Include
- Description of the violation
- Evidence (screenshots, logs, URLs)
- Your contact information (for follow-up)
- Any relevant context or background
Response Timeline
- Acknowledgment: Within 24 hours
- Investigation: 2-5 business days
- Resolution: Varies based on severity (urgent security issues addressed immediately)
Security Vulnerability Reporting Exception
Responsible Security Research is Encouraged
Security researchers following responsible disclosure guidelines are exempt from this policy when:
- Testing for security vulnerabilities in a non-destructive manner
- Following our Security Policy for responsible disclosure
- Not accessing, modifying, or deleting user data
- Not causing service disruption or degradation
- Reporting findings promptly via GitHub Security Advisories
See our Security Policy for full vulnerability reporting guidelines.
Changes to This Policy
We may update this Acceptable Use Policy from time to time:
- Notification: Material changes will be posted on this page
- Effective Date: Changes take effect immediately upon posting
- Continued Use: Continued use constitutes acceptance of changes
- Review: We recommend reviewing this policy periodically
Related Policies
- Terms of Service - Legal agreements
- Privacy Policy - How we protect your data
- Security Policy - Security measures and vulnerability reporting
- Accessibility Statement - Accessibility commitment
- Contact Us - Get in touch
Contact Information
Questions about this Acceptable Use Policy? Contact us.