← Back to Scanner

Terms of Service

Effective date: March 4, 2026

1. Acceptance of Terms

By downloading, installing, or using ClawSploit, you agree to be bound by these Terms of Service. If you do not agree, do not use the software.

2. License

ClawSploit is released under the MIT License. You are free to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the software, subject to the conditions of the MIT License.

3. Authorized Use Only

ClawSploit is designed exclusively for authorized security testing. You must:

Unauthorized scanning of systems is illegal in most jurisdictions. You are solely responsible for ensuring you have proper authorization before conducting any security audit.

4. No Warranty

ClawSploit is provided "as is", without warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose, and non-infringement.

The software is not guaranteed to detect all vulnerabilities in OpenClaw instances. A clean scan result does not certify that a target is free of security issues.

5. Limitation of Liability

In no event shall the ClawSploit authors or contributors be liable for any claim, damages, or other liability, whether in an action of contract, tort, or otherwise, arising from, out of, or in connection with the software or the use or other dealings in the software.

You assume all risk and liability for:

6. Non-Destructive Scanning

ClawSploit is designed to perform read-only, non-destructive security scans. The tool does not intentionally modify, delete, or corrupt data on target systems. However, network-based scanning inherently involves sending requests to targets, and the authors cannot guarantee zero impact on all possible target configurations.

7. CVE Database

The CVE database included with ClawSploit is maintained for educational and security testing purposes. CVE identifiers are assigned by recognized CVE Numbering Authorities. Vulnerability information is provided to help users identify and remediate security issues in their own deployments.

8. Modifications

These terms may be updated from time to time. Continued use of the software after changes constitutes acceptance of the revised terms. Check this page for the latest version.

9. Governing Law

These terms shall be governed by and construed in accordance with applicable laws, without regard to conflict of law principles.

10. Contact

For questions about these terms, please open an issue on the ClawSploit project repository.