Skip to main content

Terms of Service

Terms of use for glyph.sh

Last Updated: November 14, 2025

Acceptance of Terms

By accessing and using glyph.sh (“the Site”), you accept and agree to be bound by the terms and conditions of this agreement. If you do not agree to these terms, please do not use the Site.

Description of Service

glyph.sh provides security research resources, technical documentation, tools, scripts, and educational content related to information security, systems administration, and infrastructure automation (“the Service”).

Educational and Authorized Use Only

Security Tools and Scripts

All security tools, scripts, techniques, and information provided on this Site are intended for:

  • Educational purposes - Learning about security concepts and technologies
  • Authorized security testing - Testing systems you own or have explicit permission to test
  • Defensive security - Protecting and securing your own systems
  • Professional security work - Authorized penetration testing and security assessments

Prohibited Uses

You may NOT use any information, tools, or scripts from this Site to:

  • Access systems without explicit authorization
  • Perform unauthorized security testing or penetration testing
  • Conduct malicious activities, attacks, or exploits
  • Violate any applicable laws or regulations
  • Harm, disrupt, or compromise any systems or networks
  • Violate the rights of others

Disclaimer of Warranties

“AS-IS” Basis

THE SITE AND ALL CONTENT, TOOLS, AND SCRIPTS ARE PROVIDED “AS IS” AND “AS AVAILABLE” WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO:

  • Warranties of merchantability
  • Fitness for a particular purpose
  • Non-infringement
  • Accuracy or completeness of content
  • Functionality or security of tools and scripts

No Guarantee of Results

I make no warranties or representations about:

  • The accuracy, reliability, or completeness of any content
  • The functionality or security of any tools or scripts provided
  • The results you may achieve using any information from the Site
  • The absence of errors, vulnerabilities, or malicious code

Limitation of Liability

No Liability for Damages

TO THE MAXIMUM EXTENT PERMITTED BY LAW, GLYPH.SH AND ITS OPERATORS SHALL NOT BE LIABLE FOR ANY:

  • Direct, indirect, incidental, or consequential damages
  • Loss of data, profits, or business opportunities
  • Damages resulting from use or inability to use the Site
  • Damages resulting from use of any tools, scripts, or information
  • Damages caused by errors, omissions, interruptions, or defects
  • Damages arising from unauthorized access or security breaches

User Responsibility

YOU ASSUME ALL RISK AND RESPONSIBILITY FOR:

  • Your use of the Site and any content therein
  • Any security testing or use of tools and scripts
  • Compliance with applicable laws and regulations
  • Obtaining necessary permissions and authorizations
  • Any consequences of your actions

Technical and Financial Disclaimer

Infrastructure and Cloud Cost Guidance

Technical guides and tutorials on this Site (including AWS, CloudFront, S3, WAF, and other cloud services) are provided for educational purposes based on personal implementations on low-traffic websites.

Cost Scaling Warning: Cloud service costs can scale dramatically with traffic volume. What costs $5-10/month for a low-traffic site may cost hundreds or thousands of dollars per month for high-traffic production websites.

Before implementing any technical solution described on this Site:

  • Calculate your expected costs based on your actual traffic volume
  • Test in a staging environment before deploying to production
  • Monitor costs closely during initial deployment
  • Consult official pricing pages for current rates
  • Consider consulting with a solutions architect for high-traffic implementations

No Financial Liability

I am NOT responsible for:

  • AWS bills, cloud service costs, or infrastructure expenses incurred by implementing solutions described on this Site
  • Cost overruns or unexpected charges from following technical guides
  • Financial losses resulting from implementing any technical solutions
  • Costs associated with testing, deployment, or operation of any systems

Technical content on this Site is provided as educational material and personal experience, not professional consultation. For production deployments, especially on high-traffic or business-critical websites:

  • Consult with certified professionals (AWS Solutions Architects, security consultants, etc.)
  • Perform thorough cost analysis before implementation
  • Consider your specific use case and requirements
  • Review official documentation and best practices

You are solely responsible for any costs incurred by implementing technical solutions described on this Site.

Scripts and Code

Use at Your Own Risk

All scripts, code, and tools provided on this Site are:

  • Provided without warranty of any kind
  • Not guaranteed to be error-free or secure
  • Your responsibility to test before use
  • Your responsibility to review and understand before execution

Liability Disclaimer

I am not responsible for:

  • Any damage caused by scripts or code
  • Data loss or system failures
  • Security vulnerabilities in provided code
  • Misuse or improper implementation of scripts

User Obligations

Before using any scripts or code:

  • Review the code - Understand what it does
  • Test in a safe environment - Never run untested code in production
  • Verify permissions - Ensure you have authorization
  • Backup your data - Protect against data loss
  • Assess risks - Understand potential impacts

Intellectual Property

Site Content

All content on glyph.sh, including text, graphics, code, and design, is protected by copyright and other intellectual property rights.

User License

I grant you a limited, non-exclusive, non-transferable license to:

  • View and access the Site for personal or professional use
  • Download and use scripts/tools for authorized purposes
  • Reference and learn from educational content

Restrictions

You may NOT:

  • Redistribute or republish content without attribution
  • Use content for commercial purposes without permission
  • Remove or modify any copyright or attribution notices
  • Claim authorship of content you did not create

Automated Access and AI Training Prohibition

Web Scraping and Automated Access

Unauthorized automated access to this Site is strictly prohibited. This includes but is not limited to:

  • Web scraping, crawling, or harvesting of content
  • Automated download of content via bots or scripts
  • Circumvention of robots.txt directives
  • Use of scrapers, spiders, or similar automated tools
  • Excessive automated requests that burden Site infrastructure

Exceptions: Search engine crawlers (Googlebot, Bingbot, etc.) that respect robots.txt are permitted for indexing purposes only.

AI and Machine Learning Training Prohibition

All content on this Site is explicitly NOT licensed for use in artificial intelligence, machine learning, or large language model training. This prohibition includes:

  • Training, fine-tuning, or developing AI/ML models
  • Creating training datasets or corpora
  • Using content as input for generative AI systems
  • Incorporating content into AI knowledge bases
  • Using content to improve or develop chatbots or AI assistants

Specific AI Crawler Prohibition

The following AI crawlers and similar systems are explicitly prohibited from accessing this Site:

  • OpenAI (GPTBot, ChatGPT-User, OAI-SearchBot)
  • Anthropic (Claude-Web, ClaudeBot, Claude-SearchBot, Claude-User)
  • Perplexity AI (PerplexityBot, Perplexity-User)
  • Common Crawl (CCBot)
  • Google Extended (AI training variant of Googlebot)
  • Amazonbot, QuillBot, Diffbot, Omgilibot
  • Any other AI training or ML model development crawlers

Enforcement

As of November 14, 2025, these restrictions are enforced via AWS WAF (Web Application Firewall).

Violations will result in:

  • Immediate blocking - HTTP 403 Forbidden responses
  • Logging of violations - All unauthorized access attempts are logged with IP addresses, timestamps, and user agents
  • Legal action - Violations constitute breach of these Terms of Service and may result in legal action under:
    • Computer Fraud and Abuse Act (CFAA)
    • Digital Millennium Copyright Act (DMCA)
    • Applicable copyright and intellectual property laws
    • Trespass to chattels

Evidence of Violations

Multiple AI companies have been observed violating robots.txt directives and scraping content despite explicit prohibition. Evidence of these violations has been documented and preserved for potential legal action.

Licensing for AI Training

If you wish to license content from this Site for AI/ML training purposes, you must:

  • Contact kevin@glyph.sh for written permission
  • Negotiate appropriate licensing terms and compensation
  • Execute a formal licensing agreement
  • Provide attribution as specified in the agreement

Unauthorized use for AI training is copyright infringement and will be prosecuted.

The Site may contain links to third-party websites or resources. I:

  • Do not endorse or control third-party sites
  • Am not responsible for third-party content
  • Make no warranties about third-party sites
  • Am not liable for any harm from third-party sites

Privacy and Data Collection

Please refer to the Privacy Policy for information about data collection and use.

Modifications to Terms

I reserve the right to modify these terms at any time. Changes will be effective immediately upon posting. Your continued use of the Site after changes constitutes acceptance of modified terms.

Indemnification

You agree to indemnify and hold harmless glyph.sh and its operators from any claims, damages, losses, liabilities, and expenses arising from:

  • Your use of the Site
  • Your violation of these terms
  • Your violation of any laws or regulations
  • Your violation of any third-party rights

Governing Law

These terms shall be governed by and construed in accordance with applicable laws, without regard to conflict of law provisions.

Severability

If any provision of these terms is found to be unenforceable, the remaining provisions shall remain in full force and effect.

Contact

For questions about these terms, please contact: kevin@glyph.sh

Acknowledgment

BY USING THIS SITE, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTOOD, AND AGREE TO BE BOUND BY THESE TERMS OF SERVICE.