Acceptable Use Policy
Last updated: March 28, 2026
Azzor environments are development tools — intended for building software, running tests, and enabling agentic workflows. This policy defines the boundaries of acceptable use to keep the platform healthy for everyone. Most of it is common sense.
1. Overview
This Acceptable Use Policy ("AUP") applies to all users of the Azzor hosted service and is incorporated by reference into our Terms of Service. By using Azzor, you agree to comply with this AUP.
The goal is simple: use Azzor for software development and related tasks. Don't use it to harm others, break laws, or abuse shared infrastructure. The following sections spell out what that means in practice.
2. Intended Use
Azzor is designed for:
- Creating isolated development environments tied to tickets, PRs, and branches
- Running AI coding agents in isolated environments
- Running test suites, linters, build pipelines, and automated checks
- Generating preview URLs for stakeholder review
- Running database migrations, seeders, and other development scripts
- Developing and testing webhook integrations
- Debugging applications in an isolated context
Environments are ephemeral development sandboxes — not production hosting. If you need to serve real user traffic, you should use a production-grade hosting provider.
3. Prohibited Activities
Illegal Activities
- Violating any applicable local, state, national, or international law or regulation
- Engaging in fraud, identity theft, or other deceptive practices
- Infringing on intellectual property rights, including copyright, trademark, or patent
- Processing, storing, or transmitting data in violation of applicable data protection laws
Malicious Software & Content
- Hosting, distributing, or transmitting malware, ransomware, spyware, or any malicious code
- Creating or hosting phishing pages, credential harvesting sites, or social engineering attacks
- Distributing spam or unsolicited commercial messages from environments
- Hosting content that promotes, facilitates, or incites violence or illegal activity
Resource Abuse
- Mining cryptocurrency (Bitcoin, Ethereum, Monero, or any other currency) within environments
- Running resource-intensive workloads unrelated to software development (e.g., video rendering farms, AI training at scale)
- Deliberately degrading service performance for other Azzor users through excessive resource consumption
- Attempting to circumvent plan-based resource limits through technical means
Network Abuse
- Conducting denial-of-service (DoS or DDoS) attacks against any target
- Performing unauthorized port scanning, network enumeration, or vulnerability scanning against external systems
- Attempting to intercept network traffic outside your own environments
- Using environments as proxies for anonymous or malicious traffic
Platform Integrity
- Attempting to reverse-engineer, decompile, or extract source code from the Azzor platform itself (the hosted service, not the open-source components)
- Attempting to access other users' environments, data, or secrets
- Deliberately exploiting security vulnerabilities in the platform (report them to us instead — see Section 8)
- Reselling or sublicensing access to Azzor environments to third parties without our written consent
- Creating multiple accounts to circumvent plan limits or bans
Harmful Content
- Hosting, generating, or distributing child sexual abuse material (CSAM) — this will be reported to the appropriate authorities immediately
- Hosting content that facilitates human trafficking or exploitation
- Engaging in targeted harassment of individuals
4. Resource Usage
Each plan includes defined resource limits for environments, compute, storage, and team members. These limits exist to ensure fair access for all users on shared infrastructure.
- Environment limits: You may not run more environments simultaneously than your plan allows. Environments over your limit may be automatically suspended.
- Compute usage: Environments are sized for development workloads. Using them for sustained compute-intensive tasks (outside of normal build/test pipelines) may result in throttling or account review.
- Idle environments: Environments idle for extended periods may be automatically suspended per platform policy. Plan-specific idle timeouts are documented in your dashboard settings.
- Storage: Excessive data storage within environments (beyond typical development artifacts) may result in cleanup or suspension.
If you have a legitimate use case that requires higher limits, contact us at support@azzor.com to discuss custom plans or enterprise options.
5. Security & Integrity
Azzor environments are isolated — each environment has its own resources and should not be able to affect other customers' environments. You agree not to attempt to break this isolation.
You are responsible for the security of any code, services, and data you run within your environments. If your environment is compromised (for example, through a vulnerability in your own code), you are responsible for cleaning it up.
Do not expose sensitive credentials, private keys, or personally identifiable information in publicly accessible environment URLs or logs. Use Azzor's secrets vault for sensitive values.
6. Content Standards
While Azzor environments are development tools and we don't review the code you deploy, you remain responsible for the content and services running in your environments.
Preview URLs generated by Azzor environments may be shared with stakeholders. Any content accessible via those URLs must comply with this AUP. If we receive credible reports of AUP violations via publicly accessible environment URLs, we may suspend the relevant environments.
7. Enforcement
We reserve the right to investigate suspected violations of this AUP. Our response to violations is proportionate to their severity:
- Warning: For first-time or minor violations, we may issue a warning and request corrective action.
- Suspension: We may suspend your account or specific environments while investigating or pending corrective action.
- Termination: For serious or repeated violations — especially illegal activity, malware hosting, or cryptocurrency mining — we may terminate your account immediately without notice or refund.
- Legal referral: For illegal activities, we will cooperate with law enforcement and may report the activity to appropriate authorities.
Zero tolerance: Cryptocurrency mining, malware hosting, CSAM, and denial-of-service attacks will result in immediate account termination and, where appropriate, referral to law enforcement. No warnings, no second chances.
We may modify, suspend, or terminate your access to the Service at any time for violations of this AUP, with or without prior notice depending on the severity of the violation.
8. Reporting Violations
If you discover a security vulnerability in the Azzor platform, please disclose it responsibly by emailing support@azzor.com with details. We'll work with you to understand and address it. Please don't exploit it or disclose it publicly before we've had a chance to respond.
If you believe another Azzor user is violating this AUP — for example, running malware, conducting DDoS attacks, or hosting illegal content — please report it to support@azzor.com with as much detail as possible.
9. Contact
Questions about this policy? Email us at support@azzor.com.
For security vulnerabilities or urgent reports, use the same address with "Security" in the subject line.