PEBBLEFLOW ACCEPTABLE USE POLICY
Last Updated: April 2, 2026
This Acceptable Use Policy ("AUP") governs your use of PebbleFlow's software applications, browser extensions, and related services (collectively, the "Service") provided by Six Cailloux, LLC, d/b/a PebbleFlow ("PebbleFlow," "we," "us"). This AUP is incorporated by reference into our Terms of Service. Capitalized terms not defined here have the meanings given in the Terms.
You agree not to use the Service, or allow others to use the Service, in any manner that violates this AUP. We may update this AUP at any time by posting a revised version at pebbleflow.ai/aup. Continued use of the Service after changes are posted constitutes acceptance of the updated AUP.
1. Prohibited Content
You may not use the Service to generate, store, transmit, or distribute content that:
(a) is unlawful, defamatory, obscene, or otherwise objectionable under applicable law;
(b) exploits or endangers minors, including child sexual abuse material (CSAM) or grooming content;
(c) constitutes or promotes non-consensual intimate imagery;
(d) incites violence, terrorism, or hatred against individuals or groups based on protected characteristics;
(e) infringes any intellectual property right, including copyrights, trademarks, patents, or trade secrets;
(f) contains malware, ransomware, spyware, viruses, or other harmful code; or
(g) impersonates any person or entity, or misrepresents your affiliation with any person or entity, in a manner intended to deceive.
2. Prohibited Conduct
You may not use the Service to:
(a) violate any applicable law, regulation, or third-party right;
(b) harass, bully, stalk, threaten, or intimidate any person;
(c) send spam, unsolicited bulk messages, or automated communications to recipients who have not consented;
(d) conduct phishing, social engineering, or credential harvesting against any person or system;
(e) gain or attempt to gain unauthorized access to any computer, network, system, account, or data;
(f) interfere with, disrupt, or overload the Service or any connected network or system, including through denial-of-service attacks;
(g) scrape, crawl, or harvest data from websites or services in violation of their terms of use, robots.txt directives, or applicable law;
(h) circumvent or bypass any access control, authentication mechanism, usage limit, or security feature of the Service or any third-party service;
(i) deploy cryptomining software or use the Service's resources for cryptocurrency mining;
(j) resell, redistribute, or sublicense the Service or access to the Service without our prior written consent; or
(k) benchmark or perform competitive analysis of the Service for the purpose of building a competing product.
3. AI and Automation Misuse
Because the Service connects to AI models and can perform automated actions, the following additional restrictions apply:
(a) No deceptive AI output. You may not use AI-generated content to deceive others into believing it was created by a human when that distinction is material — for example, in academic submissions, legal filings, sworn statements, or journalistic publication — unless permitted by the applicable institution's policies.
(b) No autonomous weapons or surveillance. You may not use the Service to develop, operate, or control autonomous weapons systems, mass surveillance tools, or predictive policing systems.
(c) No unauthorized profiling. You may not use the Service to build profiles of individuals for credit scoring, insurance underwriting, employment screening, or similar high-stakes decisions without a lawful basis and the individual's knowledge.
(d) No circumvention of AI provider policies. You may not use the Service to circumvent the acceptable use or safety policies of any AI provider you access through the Service (e.g., OpenAI, Anthropic, Google, or any other provider).
(e) No automated abuse. You may not use automation features to flood, spam, or repeatedly target any person, website, API, or service in a manner that is harmful, disruptive, or violates the target's terms of use.
(f) Human oversight. You are responsible for reviewing all automated actions performed by the Service on your behalf. You may not configure the Service to take consequential actions (financial transactions, account modifications, communications to third parties) without appropriate review safeguards.
4. System Integrity
You may not:
(a) reverse engineer, decompile, disassemble, or otherwise attempt to derive the source code or algorithms of the Service, except to the extent expressly permitted by applicable law;
(b) modify, adapt, or create derivative works based on the Service;
(c) remove, alter, or obscure any proprietary notices, labels, or marks on the Service;
(d) introduce any code or mechanism designed to disable, impair, or otherwise interfere with the Service; or
(e) probe, scan, or test the vulnerability of the Service without our prior written authorization.
5. Third-Party Services and BYOK
When using the Service with third-party providers — whether through your own API keys (BYOK) or through integrations — you must:
(a) comply with the terms of service and acceptable use policies of each third-party provider;
(b) not use PebbleFlow as a vehicle to violate any third-party provider's rate limits, quotas, or usage restrictions; and
(c) accept sole responsibility for all costs, usage, and compliance obligations arising from your use of third-party services through PebbleFlow.
6. Enforcement
We may investigate suspected violations of this AUP. If we determine that a violation has occurred, we may take any action we deem appropriate, including:
(a) issuing a warning;
(b) suspending or terminating your access to the Service;
(c) removing or disabling content or functionality;
(d) reporting the activity to law enforcement; and
(e) pursuing any other legal remedy available to us.
Where practicable, we will provide notice before taking enforcement action, but we reserve the right to act immediately when necessary to protect the safety, integrity, or availability of the Service or the rights of others.
7. Reporting Violations
If you become aware of any violation of this AUP, please report it to us at [email protected]. We take all reports seriously and will investigate promptly.
8. Contact
Questions about this Acceptable Use Policy should be directed to:
Six Cailloux, LLC Email: [email protected]