Legal

Acceptable Use Policy

What Haders is built for — and the hard limits that protect everyone.

Last updated: May 16, 2026

1. Purpose

This Acceptable Use Policy ("AUP") governs what you may and may not do with the Haders AI platform. It exists to protect the platform, its users, and third parties from harm — and to ensure Haders remains a useful tool for the professionals it is designed to serve. By using Haders, you agree to this AUP in full. Violations may result in immediate account suspension or permanent termination without refund.

2. Who Haders Is For

Haders is purpose-built for professionals who need an AI that engages with difficult topics without reflexive refusals. Intended users include:

  • Security professionals.Penetration testers, red teamers, threat intelligence analysts, and incident responders working within authorised engagements.
  • Developers and researchers.Software engineers, academic researchers, and technical writers producing legitimate professional work.
  • Legal and compliance teams.Professionals analysing risk, policy, and regulatory requirements.
  • Writers and analysts.Journalists, authors, and analysts working on factual or creative projects with a legitimate need for uncensored context.

3. Permitted Use

  • Authorised security testing.Penetration testing, vulnerability research, and red team exercises against systems you own or have explicit written permission to test.
  • Threat intelligence.Researching attacker TTPs, malware behaviour, CVEs, and threat actor profiles for defensive purposes.
  • Software development.Writing, reviewing, debugging, and documenting code — including security tooling — for legitimate purposes.
  • Education and training.Learning about security concepts, attack techniques, and defensive countermeasures in an educational context.
  • Policy and compliance work.Drafting, reviewing, or analysing legal, regulatory, or security policy documents.
  • Creative and analytical work.Journalism, research, fiction, and analysis that requires candid engagement with sensitive topics.

4. Zero-Tolerance Prohibitions

The following are absolute prohibitions. Accounts found engaging in these activities are terminated immediately and permanently, without warning and without refund. We report credible cases to relevant law enforcement authorities.

  • Child sexual abuse material (CSAM).Any content that sexualises, exploits, or depicts minors. Zero tolerance, no exceptions.
  • Weapons of mass destruction.Requesting synthesis routes, enhancement techniques, acquisition strategies, or deployment methods for biological, chemical, radiological, or nuclear weapons.
  • Targeted violence.Planning, soliciting, or facilitating violence against specific named individuals or groups.
  • Malware for non-consenting systems.Creating, distributing, or deploying malicious code against systems you do not have permission to target.
  • Critical infrastructure attacks.Targeting power grids, water systems, financial systems, hospitals, or other critical infrastructure.
  • Non-consensual surveillance.Building tools to covertly monitor, track, or surveil individuals without their knowledge or consent.

5. Restricted Use (Context Required)

The following uses are not automatically prohibited but require a clearly legitimate professional context. Haders evaluates these based on the totality of the conversation, stated purpose, and account history.

  • Exploit development.Writing exploits for specific CVEs or systems is permitted in the context of authorised engagements or published research. Generic 'hack this IP' requests are not.
  • Offensive tooling.C2 frameworks, keyloggers, stagers, and similar tools may be discussed or developed for defensive research and authorised red team use.
  • Social engineering.Phishing templates, pretexting scripts, and OSINT techniques are permitted for authorised security assessments.
  • Extreme or graphic content.Graphic violence, dark fiction, or disturbing scenarios may be engaged with where there is clear creative or research intent and no real-world harm target.

6. Prohibited Conduct (Platform-Level)

  • Circumvention.Attempting to bypass platform rate limits, access controls, content systems, or account restrictions by any means.
  • Account sharing.Sharing your account credentials with others. Each account is for one individual.
  • Multiple accounts.Creating additional accounts to evade suspensions, bans, or tier restrictions.
  • Misrepresentation.Lying about your professional role, employer, or purpose to obtain responses you would not otherwise receive.
  • Automated scraping.Using automated scripts or bots to scrape, mine, or bulk-extract platform content or AI outputs at scale without API access.
  • Resale.Reselling, sublicensing, or providing access to the Haders platform to third parties without our written permission.

7. How Violations Are Handled

  • Automated detection.Haders uses automated systems to identify patterns consistent with policy violations. Blocked requests are logged by hash for review.
  • Human review.Flagged accounts are reviewed by the Haders team. We distinguish between bad-faith actors and professionals working near the edge of sensitive topics.
  • Warning.Minor or ambiguous first-time violations may result in a warning and content removal rather than account action.
  • Suspension.Repeat or clear violations result in temporary or permanent account suspension.
  • Termination.Zero-tolerance violations result in immediate permanent termination and possible law enforcement referral. No refund is issued.

8. Reporting Violations

If you witness another user or use case that you believe violates this policy, report it to: Email: abuse@haders.site Discord: discord.gg/X8sdEVHchA Reports are reviewed by the Haders team. We do not share reporter identities.

9. Changes to This Policy

We may update this AUP as the platform and its threat landscape evolve. Material changes will be communicated via email and a platform notice. Continued use of Haders after the effective date constitutes acceptance.

To report abuse: abuse@haders.site or join our Discord.

© 2026 Haders AI. All rights reserved.