Acceptable Use Policy

Effective: February 27, 2026

This Acceptable Use Policy ("AUP") defines the rules and guidelines for using the Runix cloud deployment platform (the "Service"). This policy is part of our Terms of Service and applies to all users. Violations of this policy may result in suspension or termination of your account.

1. Prohibited Activities

You may not use the Service to engage in, facilitate, or support any of the following activities:

1.1 Cryptocurrency Mining

Running cryptocurrency miners, blockchain validators, or any form of proof-of-work computation is strictly prohibited. This includes mining Bitcoin, Ethereum, Monero, or any other cryptocurrency, whether as a primary application or as a background process within another application.

1.2 Network Abuse and DDoS Attacks

You may not use the Service to launch, facilitate, or participate in distributed denial-of-service (DDoS) attacks, network flooding, packet manipulation, or any other activity designed to disrupt or degrade the availability of networks, servers, or services, including our own infrastructure and other users' deployments.

1.3 Illegal Content

Hosting, distributing, or linking to content that is illegal under applicable law is prohibited. This includes but is not limited to child sexual abuse material (CSAM), content that violates intellectual property rights without authorization, controlled substances marketplaces, and content that incites violence or terrorism.

1.4 Spam and Phishing

Using the Service to send unsolicited bulk messages (spam), conduct phishing campaigns, create deceptive websites designed to harvest credentials or personal information, or distribute fraudulent communications is prohibited. This includes hosting email relay services intended for spam distribution.

1.5 Malware Distribution

Hosting, distributing, or deploying malicious software including viruses, worms, trojans, ransomware, spyware, adware, or any other software designed to damage, disrupt, or gain unauthorized access to computer systems or data is prohibited. This includes hosting command-and-control (C2) infrastructure.

1.6 Unauthorized Access

Attempting to gain unauthorized access to the Service, other users' accounts, deployments, data, or any systems connected to the Service is prohibited. This includes brute-force attacks, credential stuffing, exploiting vulnerabilities, privilege escalation, and bypassing authentication or authorization mechanisms.

1.7 Scraping and Crawling Abuse

Using the Service to operate aggressive web scrapers, crawlers, or bots that violate the terms of service of targeted websites, consume excessive bandwidth, or are designed to circumvent rate-limiting or access controls is prohibited. Legitimate data collection tools that respect robots.txt and rate limits are permitted.

1.8 Proxy and VPN Abuse

Operating open proxies, VPN exit nodes, or Tor exit nodes on the Service for the purpose of anonymizing traffic for third parties or circumventing access restrictions is prohibited. Internal application proxies used for legitimate architectural purposes are permitted.

2. Resource Limits and Fair Use

Runix is a shared platform, and all users are expected to use resources responsibly. The following fair use guidelines apply:

  • Compute resources — applications should not consume CPU or memory significantly beyond what is typical for their workload. Sustained 100% CPU utilization for non-computational workloads may be flagged for review.
  • Build minutes — build pipelines should be efficient. Excessively long or frequent builds that abuse the build infrastructure may be throttled.
  • Bandwidth — egress bandwidth should be proportional to legitimate application traffic. Using the Service primarily as a file hosting or CDN replacement is not permitted on standard plans.
  • Storage — container images and persistent storage should be within your plan's allocation. Unused or orphaned resources should be cleaned up promptly.
  • Concurrent deployments — the number of simultaneous deployments and containers is subject to your plan limits. Attempting to circumvent these limits through multiple accounts is prohibited.

We reserve the right to throttle, suspend, or terminate applications that consume disproportionate resources, negatively impact other users, or violate fair use expectations. We will make reasonable efforts to notify you before taking action.

3. Enforcement

We take violations of this policy seriously and enforce it through a graduated response process:

  • Step 1 — Warning: For first-time or minor violations, we will notify you of the issue and provide a reasonable timeframe (typically 24-72 hours) to remedy the violation.
  • Step 2 — Temporary suspension: If the violation is not remedied after a warning, or for moderate violations, we may temporarily suspend the offending deployment or your account. You will be notified and given an opportunity to appeal.
  • Step 3 — Permanent termination: For severe violations, repeated offenses, or failure to remedy suspended accounts, we may permanently terminate your account and delete all associated data. Severe violations (such as hosting CSAM, malware distribution, or active DDoS attacks) may result in immediate termination without prior warning.

We reserve the right to bypass the graduated process and take immediate action for violations that pose an imminent threat to the safety, security, or availability of the Service or its users.

4. Reporting Violations

If you believe that a user or deployment on Runix is violating this Acceptable Use Policy, please report it to us. You can submit a report by emailing:

abuse@runixcloud.dev

When reporting a violation, please include:

  • The URL or subdomain of the application or deployment in question.
  • A description of the suspected violation.
  • Any relevant evidence (screenshots, logs, network captures).
  • Your contact information for follow-up (optional).

We investigate all reports promptly and take appropriate action. We will not disclose the identity of the reporter to the accused party unless required by law.

5. Changes to This Policy

We may update this Acceptable Use Policy from time to time. Changes will be posted on this page with an updated effective date. For material changes, we will provide notice through the Service or by email. Your continued use of the Service after changes take effect constitutes acceptance of the updated policy.

6. Contact

For questions about this Acceptable Use Policy, contact us at:

abuse@runixcloud.dev

For general legal inquiries: legal@runixcloud.dev