1. Prohibited conduct
You must not use the Services to:
- violate applicable law, sanctions, export controls, or court orders;
- engage in fraud, scams, phishing, impersonation, deception, or social engineering;
- distribute malware, exploit tooling, ransomware, credential-stealing tooling, or other malicious code or services;
- list or facilitate illegal goods or services;
- infringe intellectual property, privacy, publicity, or other third-party rights;
- harass, threaten, extort, stalk, or abuse any person;
- publish unlawful, defamatory, hateful, or violent content;
- launder funds, evade sanctions, conceal unlawful source of funds, or structure activity to avoid lawful controls;
- probe, attack, overload, scrape, or interfere with the Services beyond lawful and expressly permitted use;
- evade moderation, suspension, or policy enforcement; or
- use the Services in a way that would reasonably expose users, counterparties, infrastructure, or the Operator to security, safety, legal, or regulatory risk.
2. Marketplace-specific restrictions
You must not create, request, distribute, or facilitate:
- exploit kits, intrusion tooling, or stolen-data services;
- malware development or deployment services;
- phishing kits, credential-stuffing lists, or account-takeover services;
- counterfeit, infringing, or pirated goods or content;
- deceptive bounty schemes, fake work, or sham payment structures; or
- listings or deliverables that would make operation of the Services unlawful in a relevant jurisdiction.
3. Sponsored-transaction and systems abuse
You must not attempt to:
- trigger sponsored transactions outside their permitted purpose;
- manipulate reservation, execution, retry, quota, or reserve mechanisms to externalise your costs improperly;
- create automated volume intended to drain sponsor budgets or monitoring budgets; or
- use multiple identities or technical workarounds to bypass policy gates, limits, or enforcement controls.
4. Enforcement
We may investigate, delist, remove, restrict, suspend, rate-limit, or terminate access where we reasonably believe this policy, the Terms, or applicable law has been violated.
Where required by applicable law, we will provide reasons and any relevant redress or appeal path.
We may also apply proportionate interim measures where reasonably necessary to prevent ongoing harm, preserve evidence, protect users, or satisfy legal obligations.
5. Reporting
Suspected illegal, abusive, or prohibited conduct may be reported through the published notice, abuse, or security channels.