Introduction
This Acceptable Use Policy ("AUP") governs your use of 6xargs services ("Services"), including our website http://www.6xargs.com, API platform, and all related cybersecurity tools and services. This AUP is incorporated into and forms part of our Terms of Service.
6xargs provides SAAS (API) services for automated triage processes in bug bounty platforms, specializing in automated security vulnerability classification and penetration testing workflow optimization.
By using our Services, you agree to comply with this AUP. Violation of this policy may result in suspension or termination of your account and access to our Services.
Table of Contents
1. General Principles
Lawful Use
You must use our Services in compliance with all applicable laws, regulations, and industry standards in your jurisdiction and any jurisdiction where you conduct security testing.
Ethical Standards
All activities must adhere to recognized ethical hacking principles and responsible disclosure practices.
Professional Conduct
Maintain professional standards when using our Services, especially when representing yourself or your organization in the cybersecurity community.
Respect for Others
Respect the rights, privacy, and property of others, including target organizations, fellow security researchers, and 6xargs staff.
2. Permitted Uses
You may use our Services for the following legitimate purposes:
Authorized Security Testing
- Conducting penetration testing with explicit written authorization
- Performing vulnerability assessments on systems you own or have permission to test
- Bug bounty hunting within the scope of authorized programs
- Security research with proper authorization and ethical guidelines
Professional Security Services
- Providing cybersecurity consulting services to clients
- Conducting security audits for organizations
- Performing compliance assessments and security reviews
- Educational and training purposes in cybersecurity
API Integration
- Integrating our triage API into legitimate security workflows
- Automating vulnerability classification processes
- Building security tools that enhance cybersecurity practices
- Creating dashboards and reporting systems for security data
Research and Development
- Academic research in cybersecurity (with proper ethical approval)
- Developing new security methodologies and tools
- Contributing to the cybersecurity community knowledge base
- Improving security practices and standards
3. Prohibited Activities
The following activities are strictly prohibited when using our Services:
Illegal Activities
- Any activity that violates local, national, or international laws
- Unauthorized access to computer systems, networks, or data
- Hacking without explicit permission from system owners
- Distribution of malware, viruses, or other malicious code
- Identity theft, fraud, or financial crimes
- Violation of intellectual property rights
Malicious Use
- Using our Services to facilitate cyberattacks
- Conducting denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks
- Attempting to compromise the security of our Services or infrastructure
- Using our platform to coordinate or plan malicious activities
- Exploiting vulnerabilities for personal gain without authorization
Unauthorized Testing
- Testing systems without proper authorization or consent
- Exceeding the scope of authorized testing activities
- Ignoring or bypassing security controls during testing
- Testing production systems without appropriate safeguards
- Conducting tests that could cause system damage or downtime
Contact Information
Policy Questions
Email: support@6xargs.com
Violation Reporting
Email: support@6xargs.com
Appeals
Email: support@6xargs.com
Acknowledgment
By using our Services, you acknowledge that you have read, understood, and agree to be bound by this Acceptable Use Policy. You also acknowledge that violation of this policy may result in termination of your access to our Services and potential legal action.
This policy is designed to protect our users, clients, and the broader cybersecurity community while enabling legitimate and ethical security research and testing activities.
This document was last updated on September 29, 2025 and is governed by the laws of Mexico in accordance with our Terms of Service.