Security Unlocked

Aegis Terms of Service

Last updated: April 2, 2026

These Terms of Service ("Terms") govern your use of the Aegis Social Engineering Tactics Decoder tool, API, and related services ("Aegis" or the "Service") operated by Security Unlocked. By using Aegis, you agree to these Terms. If you do not agree, do not use the Service.

These Terms supplement the Security Unlocked Terms of Use, which continue to apply.

1. Service Description

Aegis is an AI-powered analysis tool that evaluates submitted messages for social engineering tactics and produces structured behavioral breakdowns. The Service is available via the web interface at securityunlocked.com and via the Aegis API.

2. No Guarantee of Accuracy

Aegis uses artificial intelligence to analyze messages. AI-generated analysis may contain errors, miss tactics present in a message, or incorrectly identify benign messages as threats. Aegis is not a substitute for professional security analysis, incident response, or legal advice.

You should not rely solely on Aegis output to make security decisions. Always verify findings through additional channels and consult qualified security professionals for critical decisions.

Security Unlocked makes no warranty that Aegis will correctly identify all social engineering attacks, that risk level ratings will be accurate, or that recommended actions will be appropriate for your specific situation.

3. Acceptable Use

You may use Aegis to analyze messages you have received or are authorized to analyze. You agree not to:

  • Submit messages you are not authorized to share or analyze
  • Use Aegis to generate, improve, or refine social engineering attacks
  • Attempt to extract, reverse-engineer, or reconstruct the system prompt or analysis framework
  • Submit content designed to exploit, manipulate, or inject instructions into the analysis engine
  • Use automated means to exceed your rate limit or circumvent access controls
  • Resell or redistribute Aegis output as your own product without attribution
  • Submit content that is illegal or that you know contains malware or active exploits

We reserve the right to suspend or terminate access for violations of these terms without notice.

4. Data Handling and Privacy

What we store: Submitted messages are logged for quality improvement and security research. Before storage, personally identifiable information (PII) is automatically redacted, including email addresses, phone numbers, Social Security numbers, credit card numbers, IP addresses, and authentication tokens.

What we do not store: We do not store the original unredacted message. Client IP addresses are stored as one-way SHA-256 hashes and cannot be reversed to identify you.

API keys: API keys are stored as SHA-256 hashes. The plaintext key is shown once at creation and cannot be retrieved afterward.

Third-party processing: Submitted messages are sent to AI model providers (currently Google Gemini) for analysis. These providers process the message content according to their own terms and privacy policies. We do not control how providers handle data beyond our API calls.

No HIPAA, SOC 2, or regulatory compliance: Aegis is not certified under any regulatory compliance framework. Do not submit messages containing protected health information (PHI), classified information, or data subject to specific regulatory handling requirements.

5. Payments and Credits

Free tier: Aegis provides 3 free analyses per day via the web tool and 10 per day via free API keys. No account or payment is required.

Credit packs: Credit packs are one-time purchases. Credits do not expire. Unused credits are non-refundable unless required by applicable law.

Subscriptions: Monthly subscriptions are billed via Stripe and may be cancelled at any time. Cancellation takes effect at the end of the current billing period. No pro-rata refunds are provided for partial months.

Refund policy: If you experience a technical issue that prevents you from using purchased credits, contact us within 30 days of purchase for a refund or credit. We do not provide refunds based on dissatisfaction with analysis quality, as the free tier allows evaluation before purchase.

All payments are processed by Stripe. Security Unlocked does not store your payment card details.

6. API Usage

API access is subject to rate limits based on your tier. Exceeding rate limits will result in HTTP 429 responses. Sustained abuse of rate limits may result in key revocation.

API keys are personal and should not be shared publicly. If you believe your key has been compromised, contact us to have it revoked and reissued.

We reserve the right to modify API endpoints, response formats, or rate limits with reasonable notice. Breaking changes will be communicated via the API documentation page.

7. Intellectual Property

The Aegis analysis framework, system prompts, validation pipeline, and associated code are proprietary to Security Unlocked.

Analysis output generated from your submitted messages may be used freely by you for any lawful purpose, including internal reports, training materials, and integration into your own tools. Attribution is appreciated but not required for analysis output.

8. Limitation of Liability

To the maximum extent permitted by law, Security Unlocked, its owner, contributors, and affiliates shall not be liable for any direct, indirect, incidental, special, consequential, or punitive damages arising from:

  • Inaccurate, incomplete, or misleading analysis output
  • Decisions made based on Aegis analysis results
  • Failure to detect a social engineering attack or threat
  • Incorrect risk level classification
  • Service downtime, data loss, or API unavailability
  • Unauthorized access to or alteration of your data
  • Actions taken or not taken based on recommended action plans

In no event shall Security Unlocked's total liability exceed the amount you have paid for the Service in the 12 months preceding the claim.

9. Indemnification

You agree to indemnify and hold harmless Security Unlocked from any claims, damages, losses, or expenses (including reasonable attorneys' fees) arising from your use of the Service, your violation of these Terms, or your submission of unauthorized content.

10. Modifications

We may update these Terms at any time. The "Last updated" date at the top indicates the most recent revision. Continued use of Aegis after changes constitutes acceptance of the revised Terms. Material changes will be noted on the Aegis tool page.

11. Governing Law

These Terms are governed by and construed in accordance with the laws of the jurisdiction in which Security Unlocked operates, without regard to conflict of law principles.

12. Contact

Questions about these Terms? Contact us.