Acceptable use

Beta access depends on safe use.

Merak connects work systems, AI providers, and runtime infrastructure. These boundaries keep the beta safe for every workspace.

No abuse

Do not use Merak to attack systems, scrape without permission, evade rate limits, spam, or violate laws or third-party rights.

Security testing

Good-faith testing is welcome when it avoids customer data, service disruption, persistence, and destructive actions. Report issues to security@getmerak.com.

AI use

Do not submit regulated, highly sensitive, or third-party confidential data unless your team has reviewed the beta data posture.

Runtime limits

Merak may throttle, suspend, or block activity that threatens reliability, security, customer data, or beta operating costs.