Security
Abuse & enforcement
What constitutes abuse
Protecting enforcement integrity and shared platform safety.
Abuse includes attempts to evade enforcement, overwhelm the service, or misuse API keys.
High-risk usage patterns may trigger additional review and enforcement actions.
Pause vs revoke
Temporary vs permanent enforcement actions.
API keys may be paused when the service detects high-risk usage.
Pause: temporary restriction during investigation. Requests hard-reject while paused.
Revoke: permanent invalidation. Requests are permanently rejected.
Enforcement evolution
Expect tightening over time.
Enforcement may tighten over time to improve safety and reduce misuse.
Abuse controls are part of the safety surface.
Disclaimer
This documentation is provided for general information only. It is not legal advice, not a guarantee of compliance, and not a substitute for your own security review. You are responsible for evaluating and meeting any legal, regulatory, and contractual obligations applicable to your use case.