Skip to content
Subs -25% LAUNCH-SUB
Claws -25% LAUNCH-CLAWS

Abuse Policy and Acceptable Use

3 min read Security Last updated February 10, 2026

Acceptable Use

ClawHosters provides managed hosting for OpenClaw instances. Every customer shares the same infrastructure, and the actions of one user can affect others. This policy defines what is and is not acceptable use of the service.

What You Can Do

ClawHosters instances are general-purpose AI assistants. Typical acceptable use includes:

  • Conversational AI for personal or business use
  • Document analysis and summarization
  • Code assistance and development workflows
  • Research and information gathering
  • Automation tasks using skills and plugins
  • File processing and generation

You can use any LLM tier (Eco, Standard, Premium, BYOK) for any lawful purpose. There are no restrictions on the topics you discuss with your AI instance, as long as the usage does not violate the prohibited uses below.

Prohibited Uses

The following uses are not allowed and may result in immediate suspension:

Infrastructure abuse:

  • Using your instance to launch attacks against other systems (DDoS, port scanning, brute force)
  • Running cryptocurrency mining software
  • Operating mail servers or sending spam
  • Running proxy or VPN services for third parties
  • Attempting to access other customers' instances or data

Illegal activity:

  • Any activity that violates German or EU law (hosting is in Germany)
  • Distribution of illegal content
  • Fraud, phishing, or social engineering attacks
  • Circumventing copyright protections at scale

Resource abuse:

  • Deliberately exceeding your tier's resource limits to cause infrastructure strain
  • Running automated scripts designed to consume resources without productive purpose
  • Reselling or subletting your instance to third parties without authorization

What Happens If You Violate This Policy

ClawHosters follows a graduated response process:

Severity Action Example
Minor Warning email with 48h to fix Unintentional resource overuse
Moderate Instance suspended, must contact support Running unauthorized services
Severe Immediate termination, no refund Launching attacks, illegal content

For minor violations, you receive a warning and time to fix the issue. For severe violations that put the infrastructure or other customers at risk, suspension is immediate.

Reporting Abuse

If you believe another ClawHosters instance is being used for abuse:

  1. Contact support through the dashboard
  2. Provide the IP address or any identifying information
  3. Describe the abusive behavior you observed

Reports are reviewed within 24 hours during business days.

Firewall and Automated Protection

ClawHosters instances include automated protections that enforce acceptable use:

  • Outbound SMTP blocked -- Ports 25, 465, 587, and 2525 are blocked to prevent spam
  • IRC blocked -- Ports 6667, 6697, and 194 are blocked to prevent botnet communication
  • SYN flood protection -- Rate limiting on incoming connections
  • fail2ban -- Blocks IPs after repeated failed SSH attempts

These protections run automatically on every instance. They cannot be disabled.

Your Responsibilities

As a ClawHosters customer, you are responsible for:

  • Keeping your gateway token and SSH keys secure
  • Monitoring your instance for unauthorized access
  • Ensuring your configured skills and plugins comply with this policy
  • Reporting any security incidents you discover
  • Keeping your BYOK API keys secure (if using BYOK mode)

Data and Privacy

For information about how your data is handled, see:

Changes to This Policy

This policy may be updated as the service evolves. Significant changes will be communicated via email to registered customers. Continued use of the service after policy changes constitutes acceptance of the updated terms.

Related Documentation