Acceptable Use Policy
Last Updated: November 2025
MANDATORY COMPLIANCE
This Acceptable Use Policy is incorporated into and forms part of our Terms of Service. Violation of any provision may result in immediate account termination, legal action, and reporting to law enforcement authorities.
1. Purpose
This Acceptable Use Policy ("AUP") defines prohibited uses of the wYnFuscate platform and services. It applies to all users, including free tier, paid subscribers, and API clients.
By using our Service, you agree to use it only for lawful purposes and in accordance with this AUP.
2. STRICTLY PROHIBITED ACTIVITIES
2.1 Malicious Code and Malware
YOU SHALL NOT use our Service to obfuscate:
- Viruses, trojans, worms, ransomware, or any form of malware
- Keyloggers, spyware, or surveillance software
- Backdoors or remote access trojans (RATs)
- Cryptojacking scripts or cryptocurrency miners without user consent
- Exploit code designed to compromise systems or data
- Code that violates computer fraud and abuse laws (CFAA, etc.)
2.2 Game Cheating and Exploits
You SHALL NOT use our Service to create or distribute:
- Game cheats, aimbots, wallhacks, or ESP (Extra Sensory Perception) tools
- Tools to bypass anti-cheat systems (e.g., Roblox Byfron, FE2, etc.)
- Auto-clickers, macros, or bots that violate game terms of service
- Exploits that manipulate game mechanics for unfair advantage
- Scripts that steal in-game currency or items
- Code designed to disrupt online gaming experiences
Note: We actively cooperate with game developers and platform providers to combat cheating.
2.3 Intellectual Property Violations
You SHALL NOT obfuscate code that:
- You do not own or have explicit permission to obfuscate
- Infringes copyright, trademark, or patent rights of others
- Contains stolen or pirated source code
- Violates open-source licenses (GPL, MIT, Apache, etc.) by removing attribution
- Redistributes commercial software without authorization
2.4 Illegal Content and Activities
You SHALL NOT use our Service to:
- Obfuscate code used for illegal activities (fraud, theft, extortion)
- Facilitate money laundering or terrorist financing
- Distribute child sexual abuse material (CSAM)
- Enable human trafficking or exploitation
- Violate export control or sanctions laws
- Engage in or promote illegal gambling
2.5 Unauthorized Access and Hacking
You SHALL NOT use our Service to:
- Gain unauthorized access to computer systems, networks, or data
- Conduct penetration testing without written authorization
- Distribute hacking tools or vulnerability exploits
- Bypass authentication or access control mechanisms
- Launch DDoS attacks or network disruption
- Engage in SQL injection, XSS, or other web attacks
2.6 Harassment and Abuse
You SHALL NOT create code that:
- Harasses, stalks, or threatens individuals
- Doxxes or exposes private information without consent
- Spreads hate speech or incites violence
- Impersonates others fraudulently
- Spams or sends unsolicited bulk messages
2.7 Service Abuse
You SHALL NOT:
- Attempt to reverse engineer, decompile, or circumvent our obfuscation technology
- Create or distribute deobfuscation tools targeting wYnFuscate outputs
- Scrape, spider, or use automated tools to access our Service without permission
- Exceed rate limits or abuse API quotas
- Resell our Service without an authorized reseller agreement
- Share account credentials or create multiple accounts to evade limits
- Upload files containing malicious payloads to test our systems
3. Responsible Use Guidelines
3.1 Legitimate Use Cases
Acceptable uses of wYnFuscate include:
- Protecting proprietary game logic and intellectual property
- Securing commercial Roblox scripts and assets
- Preventing unauthorized copying of educational tools
- Safeguarding business algorithms and trade secrets
- Security research with proper authorization and disclosure
- Academic research on code obfuscation techniques
3.2 Ethical Considerations
While we provide powerful obfuscation tools, we expect users to:
- Use obfuscation proportionally to the value being protected
- Not use obfuscation to hide malicious intent
- Respect the rights of legitimate security researchers
- Comply with applicable laws and platform terms of service
- Consider the impact on end users and communities
3.3 Transparency Requirements
If your obfuscated code is distributed publicly or commercially, you should:
- Disclose that the code is obfuscated (if required by platform rules)
- Provide clear licensing terms
- Include privacy policies if code collects user data
- Respect user rights under GDPR, CCPA, and similar laws
4. Monitoring and Enforcement
4.1 Detection Methods
We employ multiple methods to detect AUP violations:
- Automated scanning of uploaded files for known malware signatures
- Pattern analysis to identify cheat tool characteristics
- User reports and abuse complaints
- Watermark tracking to identify distributed malicious code
- Collaboration with game developers and platform providers
- Manual review of flagged accounts and content
4.2 Enforcement Actions
Upon detecting a violation, we may take the following actions:
- Warning: First-time minor violations may receive a warning
- Suspension: Temporary account suspension (7-30 days)
- Termination: Permanent account termination without refund
- IP Ban: Blocking access from specific IP addresses or networks
- Legal Action: Civil lawsuits for damages and injunctive relief
- Law Enforcement: Reporting to FBI, Interpol, or local authorities
We have ZERO TOLERANCE for malware, child exploitation, and illegal activities. Such violations result in immediate termination and law enforcement referral.
4.3 Appeals Process
If you believe your account was suspended or terminated in error, you may appeal by emailing legal@wynfuscate.com within 14 days with the subject line "Account Appeal". Include:
- Your account email and username
- Detailed explanation of why the action was incorrect
- Evidence supporting your claim
We will review appeals within 7 business days. Our decision is final and binding.
5. Reporting Violations
If you encounter content or activity that violates this AUP, please report it immediately:
Abuse Reports: support@wynfuscate.com (subject: "Abuse Report")
Security Issues: security@wynfuscate.com
Legal/DMCA: legal@wynfuscate.com
Please include as much detail as possible: account names, file hashes, timestamps, and evidence.
6. Cooperation with Authorities
We cooperate fully with law enforcement agencies and legal processes. We may disclose user information, including:
- Account details and IP addresses
- Uploaded files and obfuscated outputs
- Usage logs and timestamps
- Payment information and billing records
- Correspondence and support tickets
in response to valid subpoenas, court orders, search warrants, or emergency requests involving imminent harm.
7. Indemnification for AUP Violations
If your use of the Service violates this AUP and results in claims, damages, or legal action against wYnFuscate, you agree to:
- Indemnify and hold us harmless from all liabilities
- Cover our legal fees and defense costs
- Reimburse any fines, penalties, or settlements
- Cooperate with our legal defense
8. Changes to This Policy
We may update this AUP at any time to address new threats, technologies, or legal requirements. Changes are effective immediately upon posting.
Your continued use of the Service constitutes acceptance of the updated AUP.
9. Contact Information
For questions about this Acceptable Use Policy:
General Inquiries: legal@wynfuscate.com
Abuse Reports: support@wynfuscate.com (subject: "Abuse Report")
Discord: https://discord.gg/Z5xQ47Mbnd
BY USING WYNFUSCATE, YOU ACKNOWLEDGE THAT YOU HAVE READ AND UNDERSTAND THIS ACCEPTABLE USE POLICY AND AGREE TO COMPLY WITH ALL PROVISIONS. VIOLATIONS MAY RESULT IN IMMEDIATE TERMINATION AND LEGAL ACTION.