At ProdigyBuild, we prohibit content or activities that:

  1. Directly support unlawful active attack or malware campaigns that cause technical harm. This includes using our platform to distribute malicious executables, serve as attack infrastructure (e.g., organizing denial of service attacks or managing command and control servers) without any prior implicit or explicit dual-use purpose before the abuse occurs.
  2. Utilize our servers to disrupt or attempt to disrupt, or gain unauthorized access to, any service, device, data, account, or network. Please note that activities permitted under bug bounty programs, such as the ProdigyBuild Bug Bounty program, are not considered “unauthorized.” However, these activities should only impact the organization whose bug bounty program authorized the activity.