Acceptable Use Policy
Last updated: March 10, 2026
Manifesto Engine is a tool for building legitimate software. This policy defines what is and isn't allowed. We use automated safety systems to enforce these rules, but you are ultimately responsible for what you submit.
1. What You Can Build
You can use the Service to generate blueprints for any lawful software project, including but not limited to:
- Web applications, mobile apps, and APIs
- Business tools, dashboards, and internal systems
- Games, creative tools, and educational software
- Data analysis pipelines and automation workflows
- E-commerce platforms and marketplace systems
- Open-source projects and developer tools
- Security testing tools for authorized penetration testing
2. What You Cannot Build
⚠ Attempting to generate any of the following will result in your prompt being blocked and may lead to account suspension.
Malicious Software
- Malware, viruses, worms, trojans, or ransomware
- Keyloggers, screen scrapers, or credential harvesters
- Botnets, DDoS tools, or network attack infrastructure
- Rootkits, backdoors, or persistence mechanisms
- Crypto miners designed to run without user consent
Exploitation and Hacking Tools
- Exploit kits targeting specific vulnerabilities
- Phishing kits, fake login pages, or social engineering tools
- Password cracking tools designed for unauthorized access
- Tools to bypass authentication, DRM, or access controls
- SQL injection, XSS, or other attack automation tools
Surveillance and Privacy Violations
- Spyware or stalkerware for monitoring people without consent
- Facial recognition systems for mass surveillance
- Tools to scrape, aggregate, or deanonymize personal data without authorization
- Communication interception or wiretapping tools
Harmful Content
- CSAM or systems that facilitate exploitation of minors
- Weapons systems or tools that could cause physical harm
- Fraud automation, financial scams, or deceptive services
- Harassment tools, doxxing systems, or platforms designed for abuse
3. Gray Areas
Some legitimate software has dual-use potential. We evaluate context:
- Security research tools — allowed when clearly framed as authorized testing, vulnerability scanning, or educational security research.
- Data collection tools — allowed for your own data or with proper authorization. Not allowed for scraping others' data without consent.
- Automation tools — allowed for legitimate workflows. Not allowed if designed to circumvent rate limits, terms of service, or access controls on third-party platforms.
4. Enforcement
- We use a two-layer automated safety system to screen all prompts before processing.
- Blocked prompts do not consume credits.
- If your prompt is incorrectly blocked, we apologize — our filters err on the side of caution. Try rephrasing with clearer intent.
- Repeated attempts to circumvent safety filters may result in account suspension.
- We reserve the right to suspend or terminate accounts at our discretion for policy violations.
5. Reporting
If you believe our service was used to create something harmful, or if your prompt was wrongly blocked, contact us through the email associated with your account.
6. Changes
We may update this policy. Material changes will be posted on our website. Continued use constitutes acceptance.