Acceptable Use Policy.
Effective Date: January 27, 2026 // Node: AUP_PROTOCOL_v1
Adversarial Guardrail
BuruOps provides offensive security tools and forensic reports for defensive purposes only. Unauthorized use of our intelligence to target third-party infrastructure is strictly prohibited.
1. Purpose and Scope
This policy governs the responsible use of all BuruOps Intelligence Lab digital assets, forensic reports, and strategic advisories. It applies to all clients, partners, and authorized users interacting with our infrastructure.
2. Prohibited Technological Conduct
You agree not to utilize our deliverables or access our systems for:
- Unauthorized Testing: Using BuruOps forensic scripts or methodologies against targets without explicit written authorization.
- IP Manipulation: Reverse engineering or decompiling our proprietary "Buru Methodology" logic or internal auditing tools.
- Malicious Distribution: Sharing vulnerability reports or red-team findings with unauthorized third parties or public repositories.
3. Ethical Use of AI Intelligence
Strategic briefings regarding AI vulnerabilities (e.g., prompt injection perimeters) are provided to harden client systems. Utilizing these insights to exploit external models is a violation of our Integrity Mandate and may result in immediate termination of the engagement.
4. Enforcement & Accountability
Failure to comply with this AUP may lead to the suspension of active retainers, the revocation of access to The Vault, and reporting to relevant legal authorities if UK cyber-laws (Computer Misuse Act 1990) are breached.
