Terms of Service
Last updated: October 10, 2025
Legal terms for using the AppAudix mobile app security scanning service provided by AppAudix, LLC.
Important Notice
By using our services, you acknowledge that our automated scanning tools provide security assessments on a best-effort basis. Our scans are NOT legally binding compliance certifications and should NOT be relied upon as the sole basis for security or compliance decisions. Professional security audits and compliance assessments remain essential for comprehensive security validation.
1. Agreement to Terms
These Terms of Service ("Terms") constitute a binding legal agreement between you (either an individual or entity, "you," "your") and AppAudix, LLC ("AppAudix," "we," "us," "our").
By accessing, registering for, or using our services, you represent and warrant that:
- You have read, understood, and agree to be bound by these Terms.
- You are of legal age to form a binding contract (at least 18 years old).
- You have the legal authority to enter into this agreement personally or on behalf of your organization.
2. Service Description
AppAudix provides Software-as-a-Service (SaaS) automated mobile application security scanning and analysis tools designed to assist organizations in identifying potential security vulnerabilities.
Service Components
- Automated static analysis of APK and IPA files
- Vulnerability detection & multi-framework gap analysis
- Detailed security reports with recommendations
- API access and historical trend analysis
Limitations
- Automated scanning cannot replicate manual testing
- Analysis is based on compiled binary form
- Runtime or business logic issues may not be detected
- Results reflect a specific point in time
3. Authorization to Scan
CRITICAL REQUIREMENT:
You must have explicit authorization to scan any application submitted to our service. You warrant that you are the legal owner, have explicit written authorization, or are an authorized agent.
Prohibited Uses
- Scanning applications without proper authorization or ownership rights.
- Reverse engineering or extracting proprietary code from applications you do not own.
- Using scan results for malicious purposes, including vulnerability exploitation.
- Testing applications containing malware, viruses, or other malicious code.
4. Disclaimers and Limitations
No Warranty of Completeness or Accuracy
Our scanning services are provided on a "best-effort" basis without any warranty regarding completeness, accuracy, or reliability. We expressly disclaim any guarantee that our scans will identify all security vulnerabilities or compliance gaps.
Compliance Disclaimer
Our services DO NOT constitute or replace official compliance assessments, audits, or certifications for any framework. A clean scan report does not guarantee compliance or immunity from security breaches, and should be paired with broader security governance.
5. Limitation of Liability
To the maximum extent permitted by law, in no event shall AppAudix, LLC be liable for any indirect, incidental, special, consequential, or punitive damages, including loss of profits, data, use, goodwill, or other intangible losses, resulting from your use or inability to use the service.
6. Termination
We reserve the right to suspend or terminate your account immediately, without prior notice or liability, for any reason whatsoever, including without limitation if you breach the Terms (such as unauthorized scanning).
7. Independence and Non-Affiliation
AppAudix™ operates as an independent security testing service. We are not affiliated with, endorsed by, or partnered with any mobile security vendor, mobile device management (MDM) provider, application shielding company, or other security solution provider.
Our scan results and reports are provided solely for informational purposes and do not constitute recommendations, endorsements, or advice regarding any particular security product, service, or vendor. Users should conduct their own evaluation when selecting security solutions.
No Vendor Relationships: AppAudix™ does not receive compensation, referral fees, or any other consideration from security vendors based on our scan results or recommendations. Our assessments are conducted independently using our own proprietary methodology.