Terms of Service
Effective date: March 4, 2026
1. Acceptance of Terms
By downloading, installing, or using ClawSploit, you agree to be bound by these Terms of Service. If you do not agree, do not use the software.
2. License
ClawSploit is released under the MIT License. You are free to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the software, subject to the conditions of the MIT License.
3. Authorized Use Only
ClawSploit is designed exclusively for authorized security testing. You must:
- Only scan systems you own or have explicit written authorization to test
- Comply with all applicable local, national, and international laws and regulations
- Follow responsible disclosure practices if you discover new vulnerabilities
- Not use ClawSploit for any malicious, destructive, or unauthorized purpose
Unauthorized scanning of systems is illegal in most jurisdictions. You are solely responsible for ensuring you have proper authorization before conducting any security audit.
4. No Warranty
ClawSploit is provided "as is", without warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose, and non-infringement.
The software is not guaranteed to detect all vulnerabilities in OpenClaw instances. A clean scan result does not certify that a target is free of security issues.
5. Limitation of Liability
In no event shall the ClawSploit authors or contributors be liable for any claim, damages, or other liability, whether in an action of contract, tort, or otherwise, arising from, out of, or in connection with the software or the use or other dealings in the software.
You assume all risk and liability for:
- The results and interpretation of security scans
- Any actions taken based on scan findings
- Compliance with applicable laws when using the tool
- Any impact on systems being scanned
6. Non-Destructive Scanning
ClawSploit is designed to perform read-only, non-destructive security scans. The tool does not intentionally modify, delete, or corrupt data on target systems. However, network-based scanning inherently involves sending requests to targets, and the authors cannot guarantee zero impact on all possible target configurations.
7. CVE Database
The CVE database included with ClawSploit is maintained for educational and security testing purposes. CVE identifiers are assigned by recognized CVE Numbering Authorities. Vulnerability information is provided to help users identify and remediate security issues in their own deployments.
8. Modifications
These terms may be updated from time to time. Continued use of the software after changes constitutes acceptance of the revised terms. Check this page for the latest version.
9. Governing Law
These terms shall be governed by and construed in accordance with applicable laws, without regard to conflict of law principles.
10. Contact
For questions about these terms, please open an issue on the ClawSploit project repository.