unbuilt
Back to Unbuilt

Acceptable Use

Last updated: April 20, 2026

This Acceptable Use Policy explains what you may not do when using unbuilt.me (the “Service”).

You must use the Service responsibly, lawfully, and in compliance with our Terms of Service, Privacy Policy, Billing/Refund/Cancellation Policy, and all applicable laws.

1. No Abuse of Access, Plans, or Analyses

You may not:

  • attempt to obtain free or paid analyses without authorization;
  • attempt to bypass, manipulate, or evade plan restrictions, free limits, paywalls, blur gates, feature locks, or usage rules;
  • create multiple accounts, identities, sessions, or artificial usage patterns to bypass daily limits, analysis limits, or pricing logic;
  • exploit subscription logic, renewal logic, add-on logic, legacy credit logic, plan migration logic, or billing edge cases;
  • attempt to retain paid access after cancellation or non-payment by exploiting system behavior;
  • share, resell, sublicense, lease, or commercially distribute access to paid features unless explicitly authorized by us.

2. No Abuse of Free Usage

You may not:

  • use bots, scripts, rotating IPs, VPN farms, fake accounts, device farms, or similar methods to multiply free usage;
  • repeatedly trigger free analyses in a way designed to avoid upgrading or to drain infrastructure;
  • automate free usage across multiple sessions, devices, IPs, or identities;
  • intentionally generate repeated or low-value requests to consume system resources.

We may enforce free-tier limits using IP-based controls, account-based controls, device or session controls, behavioral signals, and other anti-abuse methods.

3. No Prompt Injection, Extraction, or Model Abuse

You may not:

  • attempt prompt injection, jailbreaks, adversarial prompting, or manipulation of model instructions;
  • attempt to extract, reconstruct, infer, or reveal system prompts, hidden instructions, routing logic, moderation logic, or internal workflows;
  • attempt to probe, benchmark, or stress-test the model or prompt layer in abusive ways;
  • use the Service to discover or replicate proprietary prompt design, product logic, gating logic, or output formatting in a way that competes with or harms the Service;
  • intentionally submit deceptive, malicious, or adversarial inputs designed to degrade, subvert, or destabilize outputs.

4. No Scraping, Harvesting, or Bulk Extraction

You may not:

  • scrape, crawl, or harvest data, outputs, reports, ideas, launches, startup listings, or other content from the Service at scale;
  • use automated tools to extract substantial portions of the Service, whether through the UI, APIs, scripts, browser automation, or any similar method;
  • build datasets, indexes, archives, mirrors, or derivative databases from Service content without authorization;
  • systematically collect outputs for resale, redistribution, competitive training, or competing product development.

5. No Unauthorized Automation

You may not:

  • use bots, scripts, headless browsers, browser automation, macros, or agentic systems to access or use the Service in an abusive or unauthorized way;
  • automate interactions with the Service in a way that exceeds normal human use, degrades performance, or bypasses intended product flows;
  • simulate user activity to manipulate analytics, conversion flows, billing logic, or internal systems.

Limited automation that is clearly authorized by us in writing is the only exception.

6. No Security Violations

You may not:

  • attempt unauthorized access to any account, report, export, endpoint, database, admin tool, or internal system;
  • probe, scan, test, or exploit vulnerabilities;
  • interfere with authentication, session handling, entitlement checks, payment flows, or access control mechanisms;
  • bypass rate limits, security rules, or anti-abuse protections;
  • upload malware, malicious code, exploit payloads, or any content designed to damage or compromise the Service or its providers;
  • interfere with other users' access, data, or experience.

7. No Infrastructure or Service Disruption

You may not:

  • overload, flood, or degrade our systems or our providers' systems;
  • generate excessive requests or traffic intended to slow, crash, or destabilize the Service;
  • exploit edge cases or system weaknesses in ways that increase cost, latency, or operational burden;
  • engage in denial-of-service behavior, coordinated request bursts, or similar disruptive activity.

8. No Illegal, Fraudulent, or Harmful Use

You may not use the Service to:

  • commit or facilitate fraud, scams, deception, or unlawful conduct;
  • impersonate others or misrepresent affiliation;
  • generate unlawful, infringing, abusive, defamatory, harassing, or harmful content;
  • violate privacy rights, confidentiality obligations, export controls, sanctions, or other legal restrictions;
  • submit content you do not have the right to use;
  • exploit the Service in connection with criminal activity, financial fraud, phishing, social engineering, or harmful manipulation.

9. No Misuse of Outputs

You may not:

  • represent AI-generated outputs as guaranteed facts, professional advice, or authoritative conclusions where that would be misleading or unlawful;
  • use outputs in ways that violate law, contract, confidentiality, or third-party rights;
  • use outputs to build deceptive, fraudulent, or abusive products or communications;
  • use outputs in high-stakes contexts without appropriate human review and legal/commercial validation.

You remain solely responsible for how you use any output.

10. Competitive and Reverse-Engineering Restrictions

You may not:

  • use the Service to build or improve a competing service by extracting prompts, flows, analyses, structures, or outputs at scale;
  • reverse engineer the Service except to the limited extent non-waivable law expressly permits;
  • copy, mirror, or recreate the Service's commercial logic, gating logic, prompt architecture, subscription logic, or report structure in a way that harms or competes with us;
  • benchmark the Service for public or commercial comparison in a misleading, abusive, or extractive way.

11. Enforcement

If we believe you have violated this Policy, our Terms, or any applicable law, we may take action at our sole discretion, including without notice:

  • rate limiting or throttling,
  • blocking free usage,
  • invalidating analyses,
  • revoking included or purchased analyses,
  • suspending or terminating accounts,
  • disabling saved reports or exports,
  • canceling access to paid features,
  • blocking future purchases,
  • refusing service,
  • preserving evidence,
  • and reporting conduct to payment providers, hosting vendors, law enforcement, or other relevant parties where appropriate.

We are not obligated to warn you before taking action.

12. No Refunds for Abuse

If you violate this Policy, you are not entitled to any refund, restoration, replacement, or compensation for:

  • subscription charges,
  • add-on purchases,
  • revoked analyses,
  • suspended accounts,
  • terminated access,
  • or disabled features,

except where required by applicable law.

13. Reporting Issues

If you believe your account or access was restricted in error, or if you want to report suspected abuse, contact:

builder@unbuilt.me

Privacy PolicyTerms of ServiceCookie PolicyAcceptable UseAI TransparencyDo Not Sell My InfoDisclaimerRefund, Billing, and Cancellation Policy