Zypheron

ZYPHERON

End User License Agreement

Last Updated: January 2025

1. Authorized Testing Only

ZYPHERON's security tools may only be used on systems where you have explicit authorization:

  • Your own systems: Systems you own, operate, or manage
  • Contracted testing: Systems where you have a signed penetration testing agreement
  • Bug bounty programs: Systems with published bug bounty programs that permit testing
  • Educational environments: Dedicated lab environments designed for security testing

⚠️ NEVER use these tools against systems you do not own or lack explicit permission to test. This may constitute illegal activity under computer crime laws.

2. Security Tool Guidelines

Penetration Testing:

  • Always obtain written authorization before conducting penetration tests
  • Define clear scope and limitations for testing activities
  • Avoid causing disruption or damage to target systems
  • Report findings responsibly to system owners
  • Do not access, modify, or exfiltrate sensitive data unnecessarily

Vulnerability Scanning:

  • Limit scan intensity to avoid system overload
  • Schedule scans during appropriate maintenance windows
  • Respect rate limits and system capacity
  • Document and report discovered vulnerabilities appropriately

OSINT Gathering:

  • Use only publicly available information sources
  • Respect website terms of service and robots.txt
  • Avoid overwhelming servers with excessive requests
  • Protect personal privacy of individuals in gathered data

3. Prohibited Activities

Illegal Activities:

  • Unauthorized access to computer systems
  • Data theft or exfiltration
  • System disruption or denial of service
  • Malware distribution
  • Identity theft or fraud
  • Violation of computer crime laws

Unethical Activities:

  • Testing without proper authorization
  • Exceeding agreed-upon testing scope
  • Causing unnecessary system damage
  • Accessing personal or sensitive data
  • Selling or sharing discovered vulnerabilities
  • Using findings for competitive advantage

4. Professional Standards

When using ZYPHERON for professional security testing:

  • Documentation: Maintain detailed records of testing activities and findings
  • Communication: Keep stakeholders informed of testing progress and discoveries
  • Confidentiality: Protect client information and testing results
  • Remediation: Provide actionable recommendations for vulnerability fixes
  • Follow-up: Verify that reported issues have been properly addressed

Best Practice: Follow established frameworks like OWASP, NIST, or PTES for structured and comprehensive security assessments.

5. Legal Compliance

Users must comply with all applicable laws and regulations, including:

United States:

  • Computer Fraud and Abuse Act (CFAA)
  • Digital Millennium Copyright Act (DMCA)
  • State computer crime laws
  • Industry-specific regulations (HIPAA, SOX, etc.)

International:

  • General Data Protection Regulation (GDPR)
  • Computer Misuse Act (UK)
  • Local cybercrime legislation
  • Cross-border data protection laws

6. Subscription Tiers and Usage Limits

Light Tier

  • • 100K total AI tokens/month
  • • Basic security tools
  • • Standard rate limits
  • • Community support

Pro Tier

  • • 1M total AI tokens/month
  • • Advanced security tools
  • • Higher rate limits
  • • Priority support
  • • Custom configurations

Enterprise Tier

  • • Unlimited AI tokens
  • • All security tools
  • • No rate limits
  • • Dedicated support
  • • Custom integrations
  • • On-premise options

7. Responsible Disclosure

When discovering vulnerabilities using ZYPHERON tools:

  • Report vulnerabilities directly to the affected organization
  • Provide reasonable time for remediation before public disclosure
  • Do not publicly disclose vulnerabilities without proper coordination
  • Avoid accessing or demonstrating impact on sensitive data
  • Work collaboratively with security teams to resolve issues
  • Respect bug bounty program rules and timelines

8. Educational Use

ZYPHERON welcomes educational use for learning cybersecurity concepts:

  • Use only on dedicated lab environments or your own systems
  • Respect institutional policies and guidelines
  • Focus on understanding security concepts and methodologies
  • Share knowledge responsibly within academic communities

Students and Educators: Contact us for educational discounts and specialized training resources for cybersecurity education.

9. Contact Information

Creator: Harrison McCall

Service: ZYPHERON

Website: https://zypheron.net

Email: Harrison@zypheron.com

Support: Available through the platform

ZYPHERON

ZYPHERON Desktop is a cybersecurity IDE for offensive and defensive workflows. The open source CLI remains available for terminal-first users.

AUTHORIZED USE ONLY

Infrastructure

Network

© 2025 ZYPHERON SYSTEMS//DESKTOP + CLI