> Acceptable Use Policy
Last updated: 3 April 2026
This Acceptable Use Policy (“AUP”) governs your use of the UtilsForAgents API (“Service”) and forms part of the Terms of Service. Violations may result in rate limiting, suspension, or termination of access.
1. Permitted Use
UtilsForAgents is designed for programmatic use by developers, AI agents, and automated systems. You may use the Service to:
- Compare JSON structures for change detection, configuration auditing, or data synchronisation
- Extract image EXIF metadata for cataloguing, analysis, or compliance purposes
- Strip image metadata to protect privacy before distributing images
- Convert HTML to Markdown for content indexing, archival, or presentation
- Fetch and transform text content from public URLs for analysis or summarisation
- Extract page metadata (Open Graph, Twitter Card, feeds) for link previews or content discovery
2. Prohibited Activities
You must not use the Service to:
2.1 Unlawful Activities
- Violate any applicable law, regulation, or third-party right
- Process personal data without a lawful basis under GDPR or equivalent data protection law
- Facilitate identity theft, fraud, or impersonation
- Distribute or facilitate distribution of child sexual abuse material (CSAM)
- Engage in or facilitate money laundering or terrorist financing
2.2 Harmful Content Processing
- Process images known to contain non-consensual intimate imagery for purposes of distribution
- Strip metadata from images to conceal the origin of stolen or illicitly obtained content
- Use EXIF extraction to stalk, harass, or locate individuals without their consent
- Process content that promotes violence, hate speech, or discrimination
2.3 Intellectual Property Violations
- Scrape or convert copyrighted content at scale without authorisation from the rights holder
- Use the HTML-to-Markdown or text extraction endpoints to systematically replicate third-party websites
- Strip metadata from copyrighted images to remove attribution or licensing information
2.4 Abuse & Security
- Attempt to exploit, probe, or test the Service for vulnerabilities (without prior written authorisation)
- Attempt to bypass rate limits, size limits, SSRF protections, or other security controls
- Use the URL-fetching endpoints to perform distributed denial-of-service (DDoS) attacks against third-party sites
- Use the Service as a proxy to access resources you are otherwise blocked from reaching
- Submit malicious payloads designed to cause excessive resource consumption
- Reverse-engineer the Service’s internal logic beyond what is permitted by applicable law (e.g., EU Directive 2009/24/EC)
2.5 Excessive Use
- Make requests at a rate or volume that degrades the Service for other users
- Use automated retry loops that do not respect error responses or rate-limit headers
- Submit intentionally oversized or malformed payloads to test Service limits
3. Image Processing Guidelines
Given the GDPR implications of image processing, the following specific guidelines apply:
- Consent: Ensure you have appropriate consent or legal basis before extracting EXIF data from images containing personal information (location data, device identifiers)
- Purpose limitation: Use extracted metadata only for the purpose for which it was collected
- Data minimisation: Use
/v1/image/scrub-metadatabefore sharing or publishing images to minimise personal data exposure - Transparency: If you operate a platform that processes user-uploaded images through our Service, inform your users that metadata extraction or scrubbing may occur
4. URL Fetching Guidelines
- Only fetch URLs you have the right to access
- Respect target sites’
robots.txtand terms of service - Do not use the Service to circumvent paywalls, authentication walls, or geo-restrictions
- Do not use URL-fetching endpoints to generate excessive traffic to any single target
5. Reporting Violations
If you become aware of any use of the Service that violates this AUP, please report it to:
We will investigate all credible reports and take appropriate action, which may include suspension or termination of access.
6. Enforcement
We reserve the right to:
- Monitor usage patterns for AUP compliance (metadata only; we do not inspect payload content)
- Rate-limit or block requests that exhibit abusive patterns
- Suspend access immediately for severe violations (unlawful activity, security threats)
- Provide 7 days’ notice for minor or first-time violations before taking action
7. Changes
We may update this AUP from time to time. Material changes will be reflected in the “Last updated” date. Continued use of the Service after changes constitutes acceptance.