Responsible Use Policy
Last updated: March 4, 2026
Our Commitment
Rikon is designed for defensive security intelligence — to help you understand and protect your digital footprint. We are committed to ethical open-source intelligence (OSINT) practices.
Permitted Use
- Assessing the security posture of your own digital assets
- Discovering data breaches affecting your accounts
- Identifying vulnerabilities in your domain to fix them
- Security auditing for your organization with proper authorization
Prohibited Use
- Scanning assets you do not own or have permission to scan
- Using results to harass, stalk, or blackmail others
- Attempting to exploit discovered vulnerabilities in others' systems
- Circumventing the ownership verification mechanism
- Automated or bulk scanning without authorization
Ownership Safeguards
Every scan requires ownership proof: an OTP verification code for email, or a DNS TXT record for domains. This prevents anyone from scanning assets they don't own.
Reporting Abuse
If you believe someone is misusing Rikon, report it to [email protected]. We investigate all reports and take appropriate action.