Disallowed use
Do not generate or automate phishing, spam, fraud, malware, exploit development, credential attacks, evasion, or unlawful surveillance.
Abuse Policy
WeaveAPI monitors for abuse patterns that can harm users, providers, the platform, or the wider internet.
Do not generate or automate phishing, spam, fraud, malware, exploit development, credential attacks, evasion, or unlawful surveillance.
Do not rely on model outputs as the sole basis for medical, legal, financial, employment, housing, insurance, or public safety decisions.
Attempts to evade limits, rotate accounts for abuse, scrape keys, or overload upstream providers may result in immediate suspension.
We may review request metadata, pause keys, require verification, or block traffic when a pattern indicates abuse or provider policy risk.
If you believe a WeaveAPI key or route is being abused, include relevant timestamps, request IDs, domains, and impact details in your report.
Enforcement can include warnings, rate limits, model restrictions, quota holds, key revocation, account suspension, or permanent removal.