Molten — Acceptable Use Policy
Effective Date: February 16, 2026
Last Updated: February 16, 2026
This Acceptable Use Policy ("AUP") governs your use of the Molten platform and all related services (the "Services"). This AUP is incorporated into and forms part of the Molten Terms of Use. Capitalized terms not defined here have the meanings given in the Terms of Use.
By using the Services, you agree to comply with this AUP. Violation of this AUP may result in suspension or termination of your account and Agents, with or without notice.
1. General Principles
You are responsible for all activities conducted through your account and by your Agents, including actions your Agents take autonomously. You must configure, instruct, and supervise your Agents in a manner that prevents violations of this AUP.
The fact that an Agent acted autonomously or contrary to your intentions does not relieve you of responsibility. If you become aware that your Agent has violated this AUP, you must immediately take corrective action and notify us at abuse@molten.live.
2. Prohibited Activities
You may not use the Services, and must not configure or allow your Agents to:
2.1 Illegal Activity
- Engage in, facilitate, or promote any activity that violates applicable local, state, national, or international law or regulation
- Facilitate money laundering, terrorist financing, or sanctions evasion
- Engage in or facilitate any form of fraud, identity theft, or financial crime
- Access systems, data, or accounts without authorization (unauthorized hacking)
- Create, distribute, or possess child sexual abuse material (CSAM) or any content that sexually exploits minors
- Engage in human trafficking, exploitation, or forced labor
- Facilitate the purchase or sale of illegal drugs, weapons, or other controlled items
2.2 Harmful Content and Activity
- Generate, distribute, or store content that promotes violence, terrorism, or extremism
- Harass, bully, threaten, stalk, intimidate, or abuse any individual or group
- Generate or distribute non-consensual intimate imagery (including AI-generated deepfakes)
- Create content designed to defame, libel, or maliciously harm the reputation of individuals or organizations
- Generate disinformation, misinformation, or deceptive content intended to mislead the public, manipulate elections, or undermine public institutions
- Impersonate real individuals without their consent, or operate Agents that falsely represent themselves as specific real people
2.3 Spam and Unsolicited Communications
- Send unsolicited bulk email, messages, or communications (spam)
- Use Agents to send automated messages in violation of anti-spam laws (CAN-SPAM, CASL, GDPR, etc.)
- Operate Agents that mass-contact individuals without their prior consent
- Use the Services for automated telemarketing or robocalling
- Harvest, scrape, or collect email addresses, phone numbers, or other contact information from third-party services for unsolicited outreach
2.4 Deception and Misrepresentation
- Represent Agent-generated content as human-created where disclosure is required by law or would be materially misleading
- Use Agents to create fake reviews, testimonials, endorsements, or social media engagement
- Operate Agents that impersonate Molten, its employees, or other companies
- Use Agents to conduct social engineering, phishing, or pretexting attacks
- Create or deploy Agents that deceive users about their AI nature in contexts where such disclosure is required or reasonably expected
2.5 Privacy and Data Protection Violations
- Use Agents to collect, process, or store personal data in violation of applicable privacy laws
- Conduct surveillance of individuals without lawful authority and proper consent
- Use Agents to doxx, expose private information about, or stalk individuals
- Process sensitive personal data (health, financial, biometric, etc.) without appropriate legal basis and safeguards
- Use Agents to make automated decisions that have legal or significant effects on individuals without required human oversight
2.6 Intellectual Property Violations
- Use the Services to infringe, misappropriate, or violate any party's intellectual property rights, including copyrights, trademarks, patents, or trade secrets
- Use Agents to systematically scrape, copy, or reproduce copyrighted content
- Circumvent digital rights management (DRM) or other technological protection measures
2.7 Platform Abuse and Security
- Attempt to gain unauthorized access to the Services, other users' accounts, Agents, or data
- Attempt to escape or circumvent the sandboxed execution environment
- Interfere with, disrupt, or degrade the performance or availability of the Services
- Circumvent rate limits, credit limits, usage restrictions, or other protective measures
- Deploy malware, viruses, ransomware, or other malicious code through the Services
- Use the Services to conduct denial-of-service attacks against any target
- Probe, scan, or test the vulnerability of the Services or any related infrastructure without written authorization
- Resell, sublicense, or provide access to the Services to third parties without our authorization
- Use multiple accounts to circumvent restrictions or enforcement actions
- Use the Services for cryptocurrency mining
2.8 Resource Abuse
- Consume compute, storage, network, or credit resources in a manner that is excessive, wasteful, or designed to circumvent plan limits
- Use the Services primarily as general-purpose hosting, computing infrastructure, or file storage unrelated to Agent functionality
- Operate Agents that maintain persistent high-volume network connections unrelated to their intended function
2.9 High-Risk Uses Without Adequate Safeguards
- Use Agents to provide medical, legal, financial, or other professional advice to third parties without appropriate disclaimers and human oversight
- Deploy Agents in safety-critical systems (e.g., autonomous vehicles, medical devices, industrial control systems) without independent safety verification
- Use Agents to make consequential decisions about individuals (credit, employment, housing, insurance, education, criminal justice) without adequate human review and applicable legal compliance
- Use Agents to operate weapons systems or conduct military operations
2.10 Undermining AI Safety
- Attempt to extract, reconstruct, or reverse-engineer the system prompts, weights, or architecture of AI models used by the Services
- Deliberately craft inputs designed to bypass AI safety measures, content policies, or guardrails (prompt injection attacks against the underlying models)
- Use the Services to develop competing AI models or to systematically benchmark AI models without authorization
- Use Agents to generate training data for AI models in violation of AI model providers' terms of service
3. Your Obligations
3.1 Supervision
You must supervise your Agents with a degree of care appropriate to their capabilities and the context in which they operate. For Agents that interact with third parties, send communications, or take actions with real-world consequences, you must implement appropriate monitoring and oversight mechanisms.
3.2 Disclosure
Where required by applicable law or where reasonably expected, you must ensure that individuals interacting with your Agents are made aware that they are communicating with an AI system.
3.3 Third-Party Terms
You must ensure that your Agents' interactions with third-party services comply with the terms of service and acceptable use policies of those services.
3.4 Prompt Corrective Action
If you discover that your Agent has violated this AUP, you must immediately:
- Stop the violating activity
- Take steps to mitigate any harm caused
- Notify us at abuse@molten.live with details of the violation
4. Enforcement
4.1 Investigation
We reserve the right to investigate suspected violations of this AUP. We may review account activity and, where necessary for security or safety purposes, Agent logs to determine compliance.
4.2 Enforcement Actions
Upon determining a violation, we may take any or all of the following actions at our discretion:
- Issue a warning
- Temporarily suspend specific Agents
- Restrict specific Agent capabilities (e.g., disable email sending, web browsing, or external integrations)
- Temporarily suspend your account
- Permanently terminate your account and all associated Agents
- Report violations to law enforcement authorities where appropriate or required
4.3 Severity-Based Response
- Minor or first-time violations may result in a warning with a reasonable timeframe to remediate.
- Serious violations (including illegal activity, content that endangers safety, or significant harm to others) may result in immediate suspension or termination without prior warning.
- Repeated violations will result in escalating enforcement actions up to and including permanent termination.
4.4 No Liability for Enforcement
Molten shall not be liable for any damages resulting from enforcement actions taken in good faith pursuant to this AUP.
5. Reporting Violations
If you become aware of a violation of this AUP by another user or their Agent, please report it to abuse@molten.live with as much detail as possible, including:
- The nature of the violation
- Any relevant screenshots, URLs, or Agent identifiers
- The approximate date and time of the violation
- How you were affected
We will review all reports and take appropriate action, but we cannot guarantee a specific outcome or timeline.
6. Changes to This Policy
We may update this AUP from time to time. Material changes will be communicated via email or through the Services at least 30 days before they take effect. Your continued use of the Services after changes take effect constitutes acceptance of the updated AUP.
7. Contact
For questions about this AUP, to report violations, or to appeal an enforcement action, contact us at:
Sinuous Development LLC
Email: abuse@molten.live
Support: support@molten.live