Terms and Conditions

Terms and Conditions - PentestO

Terms and Conditions

Last Updated: January 27, 2026

Welcome to PentestO. These Terms and Conditions ("Terms", "Agreement") govern your access to and use of the PentestO security testing platform located at pentesto.com.au (the "Service", "Platform"). Please read these Terms carefully before using our Service.

CRITICAL: By using PentestO, you acknowledge that unauthorized security testing may be illegal in your jurisdiction. You are solely responsible for ensuring you have proper authorization to test any target systems. Violation of this requirement may result in immediate account termination and potential legal consequences.

1. Acceptance of Terms

1.1 Agreement to Terms

By accessing or using PentestO, you agree to be bound by these Terms and all applicable laws and regulations. If you do not agree with any part of these Terms, you must not use our Service.

1.2 Eligibility

You must be at least 18 years old and have the legal capacity to enter into binding contracts to use this Service. By using PentestO, you represent and warrant that you meet these requirements.

1.3 Modifications to Terms

We reserve the right to modify these Terms at any time. We will notify you of material changes via email or through a prominent notice on our Platform. Your continued use of the Service after such modifications constitutes acceptance of the updated Terms.

2. Service Description

2.1 PentestO Platform Overview

PentestO is a comprehensive security testing platform that provides automated vulnerability assessment and penetration testing capabilities through seven specialized tools:

Tool Port Purpose
EnumBox 9001 Endpoint discovery and enumeration using Katana
VulnBox 9002 Vulnerability scanning using Nuclei templates
LogicBox 9003 Security finding aggregation and correlation
ExploitBox 9004 Exploitation testing and proof-of-concept validation
WebBox 9005 Web application security testing including XSS detection with dalfox
AuthBox 9006 Authentication and authorization testing (JWT, session management)
APIBox 9007 API security testing with Swagger/OpenAPI support

2.2 Service Features

The Platform provides the following capabilities:

  • Automated Security Scanning: Comprehensive vulnerability detection across web applications, APIs, and authentication mechanisms
  • Progress Tracking: Real-time monitoring of long-running security scans
  • Persistent Storage: Historical scan results and data retention
  • JSON Export: Comprehensive security reports in JSON format
  • Background Processing: Celery-based asynchronous task execution for extended scans
  • Integrated Pipeline: Seamless workflow across multiple security testing domains

2.3 Service Limitations

The Service is subject to the following limitations:

  • Timeout Controls: Scans are subject to timeout limits (5-10 minutes per tool) to ensure platform stability
  • Rate Limiting: Concurrent scans and API requests are rate-limited to prevent abuse
  • Resource Constraints: Heavy scans may be queued during peak usage periods
  • Tool Availability: Individual tools may be temporarily unavailable for maintenance or updates

3. Account Registration and Security

3.1 Account Creation

To access the Service, you must:

  • Provide accurate, complete, and current registration information
  • Maintain and update your account information to keep it accurate
  • Create a strong, unique password for your account
  • Accept sole responsibility for all activities under your account

3.2 Account Security

You are responsible for:

  • Maintaining the confidentiality of your account credentials
  • Immediately notifying us of any unauthorized access or security breach
  • Not sharing your account with others or allowing unauthorized access
  • Using strong authentication practices

3.3 Account Termination

We reserve the right to suspend or terminate your account if:

  • You violate these Terms or applicable laws
  • You conduct unauthorized security testing
  • You engage in abusive or fraudulent activity
  • Your account remains inactive for an extended period
  • We are required to do so by law or legal process

4. Authorized Use and Legal Compliance

⚠️ LEGAL REQUIREMENT: You must have explicit written authorization to conduct security testing on all target systems. Unauthorized access to computer systems is illegal under the Computer Fraud and Abuse Act (USA), Computer Misuse Act (UK, Australia), and similar laws worldwide.

4.1 Authorization Requirements

Before using PentestO to test any target, you must:

  • Own the target system or application being tested, OR
  • Have explicit written permission from the system owner, OR
  • Have a formal penetration testing agreement in place

4.2 Prohibited Activities

You must NOT use PentestO to:

  • Test systems without proper authorization
  • Conduct malicious attacks or cause damage to target systems
  • Access, modify, or exfiltrate data without authorization
  • Test critical infrastructure, government systems, or financial institutions without proper legal frameworks
  • Violate privacy laws or regulations
  • Engage in any illegal activity
  • Test systems during unauthorized time windows
  • Exceed the scope of your authorized testing agreement

4.3 Compliance with Laws

You agree to comply with all applicable laws, including but not limited to:

  • Computer fraud and abuse laws
  • Data protection and privacy regulations (GDPR, CCPA, Privacy Act 1988)
  • Telecommunications regulations
  • Cybersecurity laws and standards
  • Export control regulations

4.4 Acceptable Use

You may use PentestO only for:

  • Authorized security assessments and penetration testing
  • Vulnerability research on systems you own or have permission to test
  • Security training and education (on designated practice environments)
  • Compliance testing as required by security frameworks (PCI-DSS, ISO 27001, etc.)

5. User Responsibilities

5.1 Target System Responsibility

You acknowledge and agree that:

  • You are solely responsible for obtaining and maintaining proper authorization
  • You must verify authorization before submitting targets to PentestO
  • You must respect scope limitations defined in testing agreements
  • You must notify system owners of discovered vulnerabilities in accordance with responsible disclosure practices
  • You will not hold PentestO liable for any consequences of unauthorized testing

5.2 Data Security

You are responsible for:

  • Protecting sensitive data obtained during security testing
  • Properly handling authentication credentials (JWT tokens, API keys, session cookies)
  • Securely storing and managing scan results
  • Deleting sensitive data when no longer needed
  • Complying with data protection requirements when testing systems containing personal data

5.3 Scan Configuration

You must:

  • Configure scans appropriately to avoid service disruption
  • Respect rate limits and timeout settings
  • Schedule intensive scans during approved maintenance windows
  • Monitor scan progress and stop scans if issues arise
  • Provide accurate target information to ensure scan accuracy

6. Intellectual Property

6.1 PentestO Intellectual Property

The Service, including all software, tools, interfaces, documentation, and content, is owned by PentestO and protected by copyright, trademark, and other intellectual property laws. You are granted a limited, non-exclusive, non-transferable license to access and use the Service in accordance with these Terms.

6.2 Third-Party Tools

PentestO integrates the following open-source security tools:

  • Nuclei: Used under ProjectDiscovery's MIT License
  • Katana: Used under ProjectDiscovery's MIT License
  • dalfox: Used under its respective open-source license

These tools remain the property of their respective owners and are subject to their original licenses.

6.3 User Content

You retain ownership of:

  • Target URLs and systems you submit for testing
  • Custom API specifications (Swagger/OpenAPI files) you upload
  • Authentication credentials you provide

However, you grant PentestO a limited license to process this data solely for the purpose of providing the Service.

6.4 Scan Results

Scan results generated by PentestO are your property. However, we reserve the right to use anonymized, aggregated scan data to:

  • Improve our scanning capabilities
  • Develop new vulnerability detection signatures
  • Conduct security research
  • Generate industry benchmarks and statistics

7. Payment and Billing

7.1 Subscription Plans

PentestO offers various subscription tiers with different features and usage limits. Pricing information is available on our website and subject to change with 30 days' notice.

7.2 Payment Terms

By subscribing to a paid plan, you agree to:

  • Provide accurate billing information
  • Pay all fees according to the billing schedule
  • Authorize automatic recurring payments (if applicable)
  • Pay applicable taxes and fees

7.3 Refund Policy

Refunds are provided under the following conditions:

  • Service downtime exceeding 99% uptime SLA (for applicable tiers)
  • Billing errors or duplicate charges
  • Cancellation within 14 days of initial subscription (pro-rated)

Refunds are not provided for:

  • Violation of Terms resulting in account termination
  • Change of mind after 14-day period
  • Failure to use the Service

7.4 Cancellation

You may cancel your subscription at any time. Upon cancellation:

  • You will retain access until the end of the current billing period
  • No refund will be provided for partial months
  • Your scan data will be retained for 90 days before deletion

8. Service Availability and Performance

8.1 Service Level

We strive to maintain high availability but do not guarantee uninterrupted access. The Service is provided "as is" and "as available."

8.2 Maintenance and Downtime

We reserve the right to:

  • Perform scheduled maintenance with advance notice
  • Conduct emergency maintenance without notice
  • Temporarily suspend the Service for updates or security patches
  • Modify or discontinue features with reasonable notice

8.3 Technical Support

Technical support is provided via email at support@pentesto.com.au. Response times vary based on subscription tier:

  • Enterprise: 4-hour response for critical issues
  • Professional: 24-hour response for standard issues
  • Basic: 48-hour response for general inquiries

9. Data Protection and Privacy

9.1 Privacy Policy

Your use of PentestO is also governed by our Privacy Policy, which is incorporated into these Terms by reference. Please review our Privacy Policy at pentesto.com.au/privacy.

9.2 Data Processing

By using the Service, you consent to:

  • Processing of target URLs and system data for security testing purposes
  • Storage of scan results and vulnerability findings
  • Analysis of scan data to improve service quality
  • Data transfers necessary to provide the Service

9.3 Data Retention

We retain your data as follows:

  • Scan results: Indefinitely (unless deleted by you)
  • Account data: Duration of active account plus 90 days
  • System logs: 90 days for security and troubleshooting
  • Billing records: As required by law (typically 7 years)

9.4 Data Security Measures

We implement industry-standard security controls including:

  • SSL/TLS encryption via Let's Encrypt certificates
  • ModSecurity 3.0.10 Web Application Firewall
  • Secure password hashing and storage
  • Docker container isolation
  • Regular security updates and patch management
  • Access controls and authentication mechanisms

10. Disclaimers and Limitations of Liability

IMPORTANT: Please read this section carefully as it limits our liability and sets forth important disclaimers about the Service.

10.1 Service Disclaimer

THE SERVICE IS PROVIDED "AS IS" AND "AS AVAILABLE" WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO:

  • Warranties of merchantability, fitness for a particular purpose, or non-infringement
  • Warranties that the Service will be uninterrupted, secure, or error-free
  • Warranties regarding the accuracy, completeness, or reliability of scan results
  • Warranties that all vulnerabilities will be detected

10.2 Security Testing Limitations

You acknowledge that:

  • No security tool is perfect: PentestO may produce false positives or false negatives
  • Scanning is not comprehensive: Automated tools cannot detect all security issues
  • Results require validation: Findings should be manually verified by qualified security professionals
  • Scanning is not exploitation: Detection of a vulnerability does not guarantee exploitability
  • New vulnerabilities emerge: Zero-day vulnerabilities may not be detected

10.3 Limitation of Liability

TO THE MAXIMUM EXTENT PERMITTED BY LAW, PENTESTO SHALL NOT BE LIABLE FOR:

  • Indirect, incidental, consequential, or punitive damages arising from your use of the Service
  • Loss of data, profits, revenue, or business opportunities resulting from Service use or unavailability
  • Damages resulting from unauthorized security testing conducted using our Platform
  • Damages caused by false positives or false negatives in scan results
  • Service disruptions or downtime affecting your target systems
  • Security breaches at target systems discovered through our Service
  • Legal consequences arising from your violation of applicable laws

10.4 Maximum Liability Cap

In no event shall PentestO's total liability to you for all claims arising from or related to the Service exceed the amount you paid to PentestO in the 12 months preceding the claim, or $100 AUD, whichever is greater.

10.5 Third-Party Actions

PentestO is not responsible for:

  • Actions taken by target system owners in response to security testing
  • Legal action resulting from unauthorized testing
  • Third-party claims related to your use of the Service
  • Bugs or issues in third-party open-source tools (Nuclei, Katana, dalfox)

11. Indemnification

11.1 Your Indemnification Obligation

You agree to indemnify, defend, and hold harmless PentestO, its officers, directors, employees, contractors, and agents from and against any claims, liabilities, damages, losses, costs, expenses, or fees (including reasonable attorneys' fees) arising from:

  • Your violation of these Terms
  • Your violation of any law or regulation
  • Your unauthorized security testing or illegal access to systems
  • Your infringement of any third-party rights
  • Your misuse of scan results or vulnerability information
  • Any content or data you submit to the Service
  • Your failure to obtain proper authorization for security testing

11.2 Defense of Claims

PentestO reserves the right to assume the exclusive defense and control of any matter subject to indemnification by you, and you agree to cooperate with our defense of such claims.

12. Dispute Resolution

12.1 Governing Law

These Terms shall be governed by and construed in accordance with the laws of Australia (specifically Western Australia), without regard to its conflict of law provisions.

12.2 Jurisdiction

You agree that any legal action or proceeding arising from these Terms shall be brought exclusively in the courts of Western Australia, Australia. You consent to the personal jurisdiction of such courts.

12.3 Informal Resolution

Before filing any legal claim, you agree to first contact us at legal@pentesto.com.au to attempt to resolve the dispute informally. We will work in good faith to resolve disputes through negotiation.

12.4 Arbitration

If informal resolution fails, disputes shall be resolved through binding arbitration in Perth, Western Australia, under the rules of the Australian Centre for International Commercial Arbitration (ACICA), except for:

  • Claims for injunctive or equitable relief
  • Claims related to intellectual property
  • Small claims court matters under jurisdictional limits

12.5 Class Action Waiver

You agree that any proceedings to resolve disputes will be conducted on an individual basis and not as a class action, consolidated action, or representative action.

13. Prohibited Uses and Enforcement

13.1 Platform Abuse

You must not:

  • Attempt to circumvent security controls or rate limits
  • Reverse engineer, decompile, or disassemble any part of the Service
  • Use automated tools to access the Service beyond normal operation
  • Overload our infrastructure with excessive requests
  • Interfere with other users' access to the Service
  • Introduce malware, viruses, or harmful code
  • Attempt to gain unauthorized access to our systems

13.2 Content Restrictions

You must not use PentestO to test or attack:

  • Systems containing child sexual abuse material
  • Systems involved in terrorism or violent extremism
  • Systems facilitating illegal weapons or drug trafficking
  • Systems designed to circumvent law enforcement

13.3 Enforcement Actions

Upon detection of violations, we may:

  • Issue warnings or temporary suspensions
  • Terminate your account immediately
  • Report illegal activity to law enforcement
  • Cooperate with investigations and provide user data as required by law
  • Pursue legal action for damages or injunctive relief

14. Export Controls and Sanctions

14.1 Export Compliance

The Service may be subject to export control laws and regulations. You represent that you are not:

  • Located in a country subject to comprehensive sanctions
  • Listed on any government restricted parties list
  • Prohibited from receiving products or services under applicable export laws

14.2 Technology Use Restrictions

You agree not to use the Service for:

  • Development of weapons of mass destruction
  • Nuclear, chemical, or biological weapons programs
  • Missile technology development
  • Any purpose prohibited by export control regulations

15. Miscellaneous Provisions

15.1 Entire Agreement

These Terms, together with our Privacy Policy, constitute the entire agreement between you and PentestO regarding the Service and supersede all prior agreements and understandings.

15.2 Severability

If any provision of these Terms is found to be unenforceable or invalid, that provision shall be limited or eliminated to the minimum extent necessary, and the remaining provisions shall remain in full force and effect.

15.3 Waiver

Our failure to enforce any right or provision of these Terms shall not constitute a waiver of such right or provision. Any waiver must be in writing and signed by an authorized representative of PentestO.

15.4 Assignment

You may not assign or transfer these Terms or your account without our prior written consent. We may assign these Terms without restriction. Any attempted assignment in violation of this section is void.

15.5 Force Majeure

PentestO shall not be liable for any failure or delay in performance due to circumstances beyond our reasonable control, including acts of God, war, terrorism, riots, natural disasters, or infrastructure failures.

15.6 Notices

Notices to PentestO must be sent via email to legal@pentesto.com.au. Notices to you will be sent to the email address associated with your account. You agree that electronic notices satisfy any legal communication requirements.

15.7 Survival

The following sections shall survive termination of these Terms: Intellectual Property, Payment and Billing (for unpaid amounts), Disclaimers and Limitations of Liability, Indemnification, Dispute Resolution, and Miscellaneous Provisions.

16. Responsible Disclosure

16.1 Reporting Security Issues

If you discover security vulnerabilities in PentestO's platform, we request that you:

  • Report the issue confidentially to security@pentesto.com.au
  • Provide sufficient detail to reproduce the vulnerability
  • Allow reasonable time for remediation before public disclosure
  • Do not exploit the vulnerability beyond what is necessary for demonstration

16.2 Bug Bounty

We may offer rewards for responsibly disclosed security vulnerabilities. Details of our bug bounty program are available upon request.

17. Professional Use and Recommendations

Best Practices for Using PentestO

To maximize the value of our Platform and ensure responsible security testing:

  • Always obtain written authorization before testing
  • Define clear scope and boundaries for security assessments
  • Schedule intensive scans during approved maintenance windows
  • Validate automated findings with manual testing
  • Follow responsible disclosure practices for discovered vulnerabilities
  • Document all testing activities and findings
  • Maintain chain of custody for sensitive evidence
  • Engage qualified security professionals to interpret results
  • Regularly re-test systems after remediation
  • Integrate security testing into your development lifecycle

17.1 Not a Substitute for Professional Services

PentestO is a tool to assist with security testing but does not replace:

  • Professional penetration testing services
  • Security consulting and advisory services
  • Compliance assessments and audits
  • Legal counsel regarding authorization and liability
  • Incident response and forensic services

17.2 Recommendations

We recommend that users:

  • Combine automated scanning with manual testing
  • Engage professional penetration testers for critical assessments
  • Consult legal counsel before conducting security testing
  • Maintain comprehensive documentation of testing activities
  • Follow industry frameworks (OWASP, NIST, PTES) for methodology

18. Contact Information

For questions, concerns, or notices regarding these Terms, please contact us:

PentestO Legal Department
Email: legal@pentesto.com.au
Support: support@pentesto.com.au
Security: security@pentesto.com.au
Website: pentesto.com.au

Business Address:
PentestO Pty Ltd
Perth, Western Australia
Australia


BY USING PENTESTO, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTOOD, AND AGREE TO BE BOUND BY THESE TERMS AND CONDITIONS. IF YOU DO NOT AGREE, DO NOT USE THE SERVICE.

© 2026 PentestO Pty Ltd. All rights reserved.
These Terms and Conditions were last updated on January 27, 2026.

Last updated: January 27, 2026