Acceptable Use Policy

Celiums.io
Effective Date: March 25, 2026

This Acceptable Use Policy (“AUP”) governs access to and use of the Celiums.io website, platform, modules, APIs, MCP integrations, API keys, software, documentation, tools, and related services (collectively, the “Services”) provided by Celiums.io (“Celiums,” “we,” “us,” or “our”).

This AUP applies to every user, customer, developer, organization, account holder, administrator, end user, contractor, and any other person or entity that accesses or uses the Services (“you” or “your”). By accessing or using the Services, you agree to comply with this AUP. If you do not agree, you must not access or use the Services.

Celiums is an AI knowledge platform offering access to 84,000+ modules through MCP and API-key-based access. Because our Services may be integrated into software, workflows, and downstream applications, you are responsible for ensuring that all use of the Services by you and anyone acting on your behalf complies with this AUP.

1. Purpose

This AUP is intended to protect Celiums, its customers, users, partners, systems, modules, intellectual property, and the public from unlawful, abusive, unsafe, fraudulent, harmful, or otherwise unauthorized activity. You may use the Services only for lawful, authorized, and legitimate business or personal purposes consistent with this AUP and any applicable agreement with Celiums.

2. Prohibited Uses

You must not use, or attempt to use, the Services in any manner that is illegal, infringes the rights of others, threatens the security or integrity of the Services, or otherwise violates this AUP.

Without limiting the foregoing, you may not use the Services to:

2.1 Illegal Activity

  • Violate any applicable law, regulation, rule, ordinance, or court order.
  • Promote, facilitate, or engage in criminal activity.
  • Support money laundering, terrorism, trafficking, sanctions evasion, illegal gambling, identity theft, or other unlawful conduct.
  • Generate, store, transmit, or distribute material that is unlawful in any applicable jurisdiction.

2.2 Harassment, Abuse, and Harmful Conduct

  • Harass, threaten, intimidate, stalk, abuse, or exploit any person or group.
  • Promote violence, hatred, discrimination, or harassment based on race, ethnicity, nationality, religion, sex, gender, gender identity, sexual orientation, disability, age, veteran status, or other protected characteristics.
  • Submit or distribute defamatory, libelous, fraudulent, deceptive, or misleading content.
  • Use the Services to invade privacy, dox individuals, or collect or expose personal data without authorization.

2.3 Malware and Security Threats

  • Develop, generate, distribute, transmit, or facilitate malware, ransomware, spyware, viruses, Trojan horses, worms, bots, keyloggers, logic bombs, or any other malicious or harmful code.
  • Use the Services to conduct phishing, pharming, credential theft, social engineering, botnet activity, command-and-control activity, cryptojacking, or other malicious cyber activity.
  • Use the Services to create or optimize exploit chains, payloads, malicious scripts, or instructions for unauthorized intrusion.

2.4 Spam and Unsolicited Communications

  • Send or facilitate spam, unsolicited bulk messages, robocalls, or unauthorized commercial communications.
  • Use the Services for email list harvesting, contact scraping, or generation of spam campaigns.
  • Misrepresent the origin, headers, routing, sender identity, or other identifying information in communications.

2.5 Fraud and Deception

  • Commit fraud or engage in deceptive, misleading, or manipulative practices.
  • Impersonate any person or entity, or falsely suggest affiliation, endorsement, or sponsorship.
  • Use the Services to create fake reviews, fake engagement, synthetic identities, forged records, or fraudulent claims.
  • Use the Services in connection with scams, pyramid schemes, deceptive marketing, or false advertising.

2.6 Unauthorized Access and Circumvention

  • Access or attempt to access accounts, systems, networks, modules, data, or resources without authorization.
  • Bypass, disable, interfere with, or circumvent authentication, access controls, usage controls, security features, or technical limitations of the Services.
  • Probe, scan, or test the vulnerability of any system or network without Celiums’ prior written consent.
  • Use stolen credentials, shared credentials, leaked API keys, or unauthorized tokens.

2.7 Rate Limit Evasion and Technical Abuse

  • Evade, bypass, or manipulate rate limits, quotas, concurrency limits, usage caps, or billing controls.
  • Use multiple accounts, API keys, workspaces, IPs, proxies, VPNs, containers, scripts, or similar methods to avoid imposed restrictions.
  • Engage in excessive, abusive, or abnormal request patterns that degrade the Services or interfere with other users.

2.8 Credential Sharing, Transfer, and Resale

  • Share, sell, sublicense, lease, transfer, publish, or otherwise make your account, API key, MCP credentials, or access rights available to third parties except as expressly authorized in writing by Celiums.
  • Allow unauthorized users to access the Services using your credentials.
  • Resell, broker, pool, or redistribute access to the Services, whether directly or indirectly, without Celiums’ express written permission.

2.9 Automated Scraping, Harvesting, and Competitive Use

  • Scrape, crawl, harvest, index, mirror, cache, or systematically extract module content, metadata, outputs, documentation, or other information from the Services, including by automated means, except as expressly permitted by Celiums in writing.
  • Use bots, scripts, headless browsers, automation frameworks, or other tools to collect data from the Services in bulk or at scale outside authorized functionality.
  • Use the Services for competitive intelligence gathering, market surveillance of Celiums’ offerings, pricing extraction, product mapping, or analysis intended to replicate or compete with the Services.
  • Benchmark, test, compare, or publish performance or output comparisons involving the Services without Celiums’ prior written consent.

2.10 Reverse Engineering and Derivative Competitive Services

  • Reverse engineer, decompile, disassemble, decode, translate, reconstruct, or attempt to derive the source code, underlying ideas, structure, algorithms, prompts, datasets, taxonomies, module logic, workflows, system architecture, or non-public aspects of the Services, except to the limited extent such restriction is prohibited by applicable law.
  • Use the Services, module content, outputs, metadata, documentation, or access patterns to build, train, improve, validate, seed, or operate a competing product or service.
  • Create a database, repository, index, or corpus from module content or outputs for resale, republication, redistribution, or use in a competing or substitute service.

3. Content Restrictions

You are solely responsible for all prompts, inputs, files, data, text, images, code, queries, requests, and other content you submit to or through the Services (“Submitted Content”). You must not submit, upload, transmit, store, or otherwise use the Services with any Submitted Content that:

  • Is illegal or promotes illegal activity;
  • Is harmful, abusive, threatening, violent, or exploitative;
  • Is defamatory, libelous, false, fraudulent, or misleading;
  • Is obscene, pornographic, sexually explicit, or otherwise objectionable;
  • Is discriminatory, hateful, or intended to incite prejudice or hostility;
  • Infringes, misappropriates, or otherwise violates any intellectual property, privacy, publicity, confidentiality, or other rights of any person or entity;
  • Contains personal data, sensitive personal information, trade secrets, or confidential information that you do not have the legal right to submit;
  • Contains malware, malicious code, exploit code, or any harmful technical payload;
  • Violates any contractual, fiduciary, regulatory, or legal duty owed to another person or entity.

Celiums may, but is not obligated to, review, monitor, filter, block, remove, or preserve Submitted Content at its sole discretion and as permitted or required by law.

4. High-Risk Prohibited Uses

The Services are not designed, intended, or authorized for high-risk activities where inaccurate, incomplete, delayed, or unavailable information could lead to death, personal injury, environmental damage, property damage, or significant legal or financial harm. You may not use the Services for, or in connection with:

4.1 Medical and Healthcare Uses

  • Medical diagnosis, treatment recommendations, patient triage, prescribing decisions, or emergency clinical decision-making;
  • Any use where outputs may be relied upon as a substitute for professional medical judgment;
  • Use involving regulated medical devices, clinical systems, or patient care workflows where failure could cause harm.

4.2 Legal Services

  • Providing legal advice or legal conclusions to be relied upon by clients, courts, agencies, or third parties;
  • Drafting, analyzing, or recommending legal positions where the output is used as a substitute for a qualified attorney’s independent review;
  • Any use in which a person may reasonably rely on output as definitive legal advice.

4.3 Financial and Investment Uses

  • Making or automating financial trading, securities, investment, lending, underwriting, insurance, or credit decisions;
  • Generating advice or recommendations relied upon for investment or trading activity;
  • Any use where output is used as the sole or primary basis for financial risk decisions.

4.4 Weapons and Harmful Capabilities

  • Designing, developing, manufacturing, acquiring, targeting, deploying, or using weapons or weapon systems;
  • Supporting military attack operations, targeting decisions, or destructive payload optimization;
  • Assisting in the construction or deployment of explosives or harmful devices.

4.5 Surveillance and Monitoring

  • Unlawful surveillance, mass surveillance, facial recognition identification in violation of law, covert tracking, or monitoring of individuals without appropriate legal authority and consent;
  • Social scoring, predictive policing, or invasive profiling in ways that violate law or civil rights.

4.6 Autonomous Systems and Safety-Critical Operations

  • Autonomous or semi-autonomous control of vehicles, drones, aircraft, industrial machinery, robotics, or any physical system where malfunction could cause injury or damage;
  • Safety-critical decision-making without meaningful human oversight and independent verification.

4.7 Critical Infrastructure

  • Operation, control, or monitoring of critical infrastructure, including power systems, water systems, transportation systems, telecommunications networks, emergency response systems, or similar essential services;
  • Any use where errors, latency, or failures could disrupt essential public or private infrastructure.

4.8 Nuclear, Biological, and Chemical Applications

  • Design, development, handling, production, optimization, or deployment of nuclear, biological, or chemical agents, materials, processes, or systems;
  • Any use related to weapons of mass destruction or hazardous materials with serious public safety implications.

If you are uncertain whether a contemplated use is high-risk, you must not proceed without Celiums’ prior written approval.

5. API and MCP Abuse

Because access to the Services may be provided through APIs, MCP integrations, and API keys, the following conduct is strictly prohibited:

  • Sharing, publishing, embedding, exposing, or otherwise making API keys or MCP credentials available to unauthorized third parties;
  • Using multiple accounts or keys to evade rate limits, quotas, or pricing tiers;
  • Performing automated bulk access, bulk extraction, or high-volume request activity not expressly permitted by your plan or by written authorization from Celiums;
  • Launching, facilitating, or participating in denial-of-service attacks, distributed denial-of-service attacks, resource exhaustion, or request flooding;
  • Exploiting bugs, vulnerabilities, undocumented behavior, or configuration weaknesses;
  • Attempting to discover, enumerate, or access non-public endpoints, hidden modules, private datasets, internal tooling, or other restricted functionality;
  • Modifying client software, requests, headers, tokens, or traffic patterns to misrepresent usage or avoid technical restrictions;
  • Using the Services in a manner that materially degrades platform performance, stability, security, or availability.

You are responsible for securing your credentials and for all activity conducted under your account, API keys, and integrations.

6. Intellectual Property and Content Protection

All rights, title, and interest in and to the Services, including modules, module content, taxonomies, metadata, documentation, APIs, software, interfaces, workflows, designs, and related materials, are and remain the property of Celiums and its licensors.

Except as expressly authorized by Celiums in writing, you may not:

  • Copy, reproduce, republish, modify, distribute, display, perform, transmit, sell, sublicense, lease, or otherwise exploit module content or other components of the Services;
  • Extract or compile module content into datasets, archives, indexes, vector databases, training corpora, or similar repositories;
  • Redistribute or resell module content, whether in original, modified, summarized, embedded, or transformed form;
  • Use module content to create, train, improve, or support a competing knowledge platform, search platform, AI product, retrieval system, content repository, or substitute service;
  • Remove, obscure, or alter copyright, trademark, attribution, or other proprietary notices.

Any unauthorized use of Celiums’ intellectual property is strictly prohibited and may result in immediate enforcement action.

7. Security and Vulnerability Research

You must not engage in security testing, penetration testing, red teaming, vulnerability scanning, exploit development, or similar security research involving the Services without Celiums’ prior written consent.

Prohibited conduct includes, without limitation:

  • Unauthorized probing or scanning of systems, endpoints, or infrastructure;
  • Attempted privilege escalation or lateral movement;
  • Credential stuffing, brute force attacks, token replay, or session hijacking;
  • Exploitation of known or suspected vulnerabilities;
  • Interception of traffic, tampering with requests, or man-in-the-middle activity.

If you believe you have discovered a vulnerability, security issue, exposed credential, or other weakness affecting the Services, you must promptly report it to [email protected] with sufficient detail to allow investigation. You must not publicly disclose the issue, exploit it, access data beyond what is strictly necessary to demonstrate the issue, or continue testing after discovery, unless Celiums provides prior written authorization. Celiums may investigate and respond in its sole discretion.

8. Monitoring, Investigation, and Enforcement

Celiums may monitor, review, log, audit, preserve, and disclose information regarding use of the Services as necessary to:

  • Enforce this AUP and any related agreement;
  • Protect the Services, users, Celiums, and third parties;
  • Detect, prevent, investigate, and respond to abuse, fraud, security incidents, or technical issues;
  • Comply with applicable law, regulation, legal process, or governmental request.

Celiums may investigate suspected violations of this AUP and may take any action it deems appropriate, at its sole discretion, including without limitation:

  • Issuing a warning;
  • Removing or blocking content;
  • Throttling or limiting access;
  • Suspending access to modules, APIs, MCP integrations, or accounts;
  • Rotating, revoking, or disabling credentials or API keys;
  • Terminating accounts or subscriptions;
  • Refusing future access to the Services;
  • Taking technical, contractual, or legal measures to prevent further violations;
  • Seeking injunctive relief, damages, indemnification, or other remedies available at law or in equity.

Celiums is not obligated to provide advance notice before taking enforcement action where we believe immediate action is appropriate.

9. Reports of Abuse

If you become aware of any violation of this AUP, misuse of the Services, security incident, infringement, unlawful content, or other abusive behavior, you must promptly report it to:

[email protected]

Reports should include all reasonably available details, such as the relevant account, module, URL, API key identifier (if known), date and time, logs, screenshots, request samples, or other supporting information. Celiums may, but is not obligated to, respond to or act upon any report.

10. Cooperation with Law Enforcement and Regulatory Authorities

Celiums may cooperate with law enforcement, regulators, courts, and other governmental authorities in connection with investigations, legal proceedings, or requests relating to use of the Services. Such cooperation may include preservation, review, monitoring, or disclosure of account information, usage records, content, logs, technical data, and other information to the extent permitted or required by applicable law.

Nothing in this AUP requires Celiums to give prior notice of such cooperation where notice is prohibited, impractical, or deemed inappropriate by Celiums.

11. Consequences of Violations

Violations of this AUP may result in serious consequences, including one or more of the following, in Celiums’ sole discretion:

  • Immediate suspension or termination of your account or access to the Services;
  • Permanent revocation of API keys, MCP credentials, and related access rights;
  • Removal, blocking, or preservation of Submitted Content;
  • Forfeiture of prepaid fees, subscription fees, usage credits, and any other amounts paid to Celiums, to the maximum extent permitted by law;
  • Civil claims, including claims for damages, costs, attorneys’ fees, and injunctive relief;
  • Referral to law enforcement or relevant regulatory authorities;
  • Public or private measures necessary to protect Celiums, its users, and third parties from harm.

You remain responsible for all activity conducted through your account, credentials, systems, applications, and integrations, whether or not specifically authorized by you.

12. No Waiver; Celiums’ Sole Discretion

Celiums reserves the right to interpret and enforce this AUP in its sole discretion. Failure to enforce any provision of this AUP in one instance does not constitute a waiver of our right to enforce it in any other instance. Celiums may determine, in its sole discretion, whether any conduct violates the letter or spirit of this AUP.

13. Updates to This Policy

Celiums may update or modify this AUP from time to time by posting a revised version on or through the Services. Unless otherwise stated, revisions are effective upon posting. Your continued use of the Services after the effective date of any revised AUP constitutes your acceptance of the updated policy.

14. Account and Payment Integrity

  • You must use the same email address for Stripe payments (plan upgrades and credit purchases) as your Celiums account registration email. Payments are matched to accounts by email. Credits and plan changes cannot be applied if the checkout email does not match your account email.
  • Attempting to manipulate billing by using different email addresses, creating duplicate accounts, or exploiting payment matching is a violation of this AUP and may result in immediate account termination.
  • Support ([email protected]) is available exclusively to paid plan subscribers (Pro and Network). Abuse of support channels by non-subscribers may result in communication restrictions.

15. Contact

For abuse reports: [email protected] For support (paid subscribers only): [email protected] For sales inquiries: [email protected] For general questions: [email protected]


By accessing or using Celiums.io, you acknowledge that you have read, understood, and agree to comply with this Acceptable Use Policy.