Effective 2026-05-16

Acceptable Use Policy

This policy governs the use of MCPSafe's user-initiated dynamic scan feature, in which a signed-in user asks MCPSafe to actively connect to a running MCP server and probe it with security checks. It applies in addition to our Terms of Service and Privacy Policy.

1. The attestation

Before each dynamic scan, you confirm:

I own this server or am authorized to perform security testing on it. I have read the MCPSafe Acceptable Use Policy.

We log this attestation immutably with the user, target, timestamp, and a hashed IP and user agent. The record is retained as a legal artifact regardless of whether the scan itself is later deleted.

2. Permitted use

3. Prohibited use

4. Credentials we handle

When you choose a non-anonymous authentication method, you may supply a bearer token, an OAuth access token, or a custom HTTP header value. We:

We do not accept OAuth client secrets, refresh tokens, SSH keys, or cloud-provider credentials. If your MCP server requires Basic Auth, build the Authorization: Basic … header yourself and supply it as a custom header.

5. Rate limits

Each dynamic scan costs 1 credit. Credits are the primary throttle — every signed-in user gets 2 free starter credits, and additional credits are sold in 10/50/200-credit packs on the pricing page. If your balance hits zero, the next scan returns 402 INSUFFICIENT_CREDITS until you top up.

On top of credits, the following abuse guards apply and return 429 when hit:

If you have a legitimate use case that needs higher limits (load testing your own infrastructure, batched CI runs), contact us before you hit the cap — we’d rather raise your ceiling than throttle a real customer.

6. Enforcement

Violations of this policy may result in suspension of the account, revocation of issued credits, and — for clear misuse — referral to law enforcement together with the attestation log.

7. Contact

Questions, scope disputes, or incident reports: security@mcpsafe.io.