/ section · acceptable use

What you
may and may not.

Effective 2026-04-19 · last revised 2026-04-19 · binding on every account.

This policy sits alongside the Terms of Service. It spells out the narrow set of behaviours we do not allow, why, and what enforcement looks like. We aim to enforce sparingly and predictably. Reading this document once is enough.

What you may do

What you may not do

  1. Market manipulation. Spoofing, layering, wash trading, marking the close, cross-market manipulation, or any activity prohibited by your exchange, jurisdiction, or applicable securities/commodities regulation.
  2. Credential abuse. Connecting API keys that do not belong to you. Connecting a key with withdrawal permission. Sharing your account credentials or API keys with third parties.
  3. Service abuse. Exceeding published rate limits; circumventing rate limits with multiple accounts; scraping private user data; running denial-of-service patterns against our API or our exchange connectors.
  4. Reverse engineering in bad faith. Decompiling or deobfuscating the service with the intent to clone it, replicate non-public algorithms, or extract commercial IP. Security research is welcomed under the security policy.
  5. Malicious tooling. Injecting malware, phishing pages, or credential-harvesting UI via any user-supplied content (notes, shared trade cards, referral links). Using the platform as a C2 relay or a money-laundering conduit.
  6. Identity fraud. Creating accounts using false personal information, synthetic identities, or compromised IDs. Bypassing sanctions or jurisdictional restrictions — see risk disclosure for the list of restricted regions.
  7. Resale and sublicensing. Reselling platform access, running signal-copying businesses that redistribute our output as your own product, or embedding our service into a downstream paid offering without written agreement.
  8. Abusive behaviour. Harassing our team or other users via any channel. Spamming referral links in places they are not welcome. Attempting to extract support resources under false premises (e.g. "my friend lost their password").
  9. Illegal activity. Any activity that violates the law of your jurisdiction, the law of the jurisdiction where the exchange operates, or applicable international sanctions.
On automation, specifically.

Automated execution is the entire point of the product — you are explicitly allowed to run triggers, webhooks, and bots. What is not allowed is using automation to evade rate limits, scrape non-public data, or execute on behalf of anyone other than yourself. If you are not sure whether your use case is permitted, ask us.

Reporting abuse

If you see behaviour you believe violates this policy, email [email protected] with enough detail to investigate (screenshots, usernames, timestamps). We acknowledge reports within two business days and will not share your identity with the reported party.

Enforcement

Violations are handled on a sliding scale:

Appeals

Every enforcement decision is appealable. Email [email protected] within 30 days of the action. Appeals are reviewed by someone other than the person who made the original decision. Our response time target is five business days.

Changes

We revise this document when behaviour patterns on the platform require it. Material changes are announced by email and in-app banner at least 14 days before taking effect.

// trust & safety · [email protected] · appeals · [email protected]