This tool is designed for authorized security testing only.
- ✅ Testing your own applications
- ✅ Penetration testing with written permission
- ✅ Bug bounty programs (within scope)
- ✅ Educational/research environments
- ✅ Capture The Flag (CTF) competitions
- ❌ Testing systems without authorization
- ❌ Exploiting vulnerabilities for personal gain
- ❌ Accessing or exfiltrating data without permission
- ❌ Denial of service attacks
- ❌ Any illegal activities
If you discover a security vulnerability in this tool itself:
- Do NOT open a public GitHub issue
- Email details to: [security contact]
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will respond within 48 hours and work with you to address the issue.
| Version | Supported |
|---|---|
| 2.0.x | ✅ Current |
| 1.x.x | ❌ No longer supported |
When using this tool:
- Always get written permission before testing
- Document your testing scope clearly
- Use in isolated environments when possible
- Protect API keys (use environment variables)
- Review logs for sensitive data before sharing
- Report findings responsibly to asset owners
The authors of this software are not responsible for any misuse or damage caused by this program. Users are solely responsible for ensuring they have proper authorization before using this tool.
Unauthorized access to computer systems is illegal in most jurisdictions and can result in severe penalties including fines and imprisonment.