Legal
Acceptable Use Policy
1. Permitted uses
Zero may be used for debugging, software development, code investigation, and AI-assisted refactoring on codebases you own or are authorized to work on. Permitted uses include: opening and resolving Work items (bugs, features, epics, greenfield projects, investigations, refactors), running planning and execution sessions, attaching proof artifacts, and exporting case data for team use.
2. Prohibited uses
You may not use Zero to:
- Generate malicious code, exploits, attack tooling, or spyware
- Automate attacks on systems, networks, databases, or infrastructure
- Circumvent security controls, authentication systems, or access controls
- Reverse engineer competitor products or proprietary systems
- Work on codebases you are not authorized to access or modify
- Scrape, harvest, or exfiltrate data from systems without authorization
- Facilitate unauthorized access to third-party systems or services
3. AI execution policy
All AI-assisted code execution within Zero requires explicit operator approval before it runs. Approval gates are enforced at the session level — no session executes code without an approved plan. Approval does not exempt you from these responsible use requirements. You remain responsible for the actions taken within your approved sessions.
4. Enforcement
Access may be revoked without notice for violations of this policy. Where termination is for cause, consumed credits and subscription fees for the current billing period are non-refundable. Polymath Engineering reserves the right to determine what constitutes a violation at its sole discretion.
5. Reporting violations
To report a suspected violation, email with the subject line "AUP violation report". Include any relevant context. Reports are reviewed within 2 business days.