LAUNCH-SUB
LAUNCH-CLAWS
LAUNCH-SUB
LAUNCH-CLAWS
Abuse Policy and Acceptable Use
Acceptable Use
ClawHosters provides managed hosting for OpenClaw instances. Every customer shares the same infrastructure, and the actions of one user can affect others. This policy defines what is and is not acceptable use of the service.
What You Can Do
ClawHosters instances are general-purpose AI assistants. Typical acceptable use includes:
- Conversational AI for personal or business use
- Document analysis and summarization
- Code assistance and development workflows
- Research and information gathering
- Automation tasks using skills and plugins
- File processing and generation
You can use any LLM tier (Eco, Standard, Premium, BYOK) for any lawful purpose. There are no restrictions on the topics you discuss with your AI instance, as long as the usage does not violate the prohibited uses below.
Prohibited Uses
The following uses are not allowed and may result in immediate suspension:
Infrastructure abuse:
- Using your instance to launch attacks against other systems (DDoS, port scanning, brute force)
- Running cryptocurrency mining software
- Operating mail servers or sending spam
- Running proxy or VPN services for third parties
- Attempting to access other customers' instances or data
Illegal activity:
- Any activity that violates German or EU law (hosting is in Germany)
- Distribution of illegal content
- Fraud, phishing, or social engineering attacks
- Circumventing copyright protections at scale
Resource abuse:
- Deliberately exceeding your tier's resource limits to cause infrastructure strain
- Running automated scripts designed to consume resources without productive purpose
- Reselling or subletting your instance to third parties without authorization
What Happens If You Violate This Policy
ClawHosters follows a graduated response process:
| Severity | Action | Example |
|---|---|---|
| Minor | Warning email with 48h to fix | Unintentional resource overuse |
| Moderate | Instance suspended, must contact support | Running unauthorized services |
| Severe | Immediate termination, no refund | Launching attacks, illegal content |
For minor violations, you receive a warning and time to fix the issue. For severe violations that put the infrastructure or other customers at risk, suspension is immediate.
Reporting Abuse
If you believe another ClawHosters instance is being used for abuse:
- Contact support through the dashboard
- Provide the IP address or any identifying information
- Describe the abusive behavior you observed
Reports are reviewed within 24 hours during business days.
Firewall and Automated Protection
ClawHosters instances include automated protections that enforce acceptable use:
- Outbound SMTP blocked -- Ports 25, 465, 587, and 2525 are blocked to prevent spam
- IRC blocked -- Ports 6667, 6697, and 194 are blocked to prevent botnet communication
- SYN flood protection -- Rate limiting on incoming connections
- fail2ban -- Blocks IPs after repeated failed SSH attempts
These protections run automatically on every instance. They cannot be disabled.
Your Responsibilities
As a ClawHosters customer, you are responsible for:
- Keeping your gateway token and SSH keys secure
- Monitoring your instance for unauthorized access
- Ensuring your configured skills and plugins comply with this policy
- Reporting any security incidents you discover
- Keeping your BYOK API keys secure (if using BYOK mode)
Data and Privacy
For information about how your data is handled, see:
- Data Privacy and Storage -- What data is stored and where
- GDPR Compliance -- Your rights under GDPR
Changes to This Policy
This policy may be updated as the service evolves. Significant changes will be communicated via email to registered customers. Continued use of the service after policy changes constitutes acceptance of the updated terms.
Related Docs
- Security Overview -- General security architecture
- Network Security -- Firewall and network protections
- Data Privacy and Storage -- Data handling and storage
- Contact Support -- Reporting abuse or getting help
Related Documentation
Architecture Overview
How ClawHosters Works ClawHosters is a managed hosting platform for OpenClaw, an open-source AI ...
What is ClawHosters?
Managed OpenClaw Hosting ClawHosters is a managed hosting platform for OpenClaw AI assistants. Y...
Security Overview
How We Protect Your Data Every ClawHosters instance runs on its own dedicated Hetzner Cloud VPS ...