This is the most important document we publish. A vulnerability scanner is a dual-use tool: legitimate for owners and mandated agencies, a criminal offense for everyone else. Read carefully.
You may only scan domains you own, or domains for which you have received explicit written authorization from the legitimate owner. There is no exception. This rule is non-negotiable and its breach results in immediate account termination, without notice and without refund.
Verbal agreements, “my friend said it was fine”, or “they're public anyway” do not count. If challenged, we will ask you for proof of authorization and may share that proof with judicial authorities.
The active tier (port scanning, CMS enumeration, CVE matching, banner grabbing) requires you to verify domain ownership before any scan runs. You can verify ownership in two ways:
Verification is persistent — you only do it once per target. Agency customers on the Agency and Pro plans may alternatively sign a single “mandate attestation” covering all clients they officially represent.
You may not use Mythoscan to:
In France, unauthorized scanning may be prosecuted under Article 323-1 of the Code pénal (accès frauduleux à un système de traitement automatisé de données), punishable by up to three years of imprisonment and 100,000 euros of fine. Similar provisions exist in most EU and non-EU jurisdictions (CFAA in the United States, CMA in the United Kingdom, etc.).
When a violation is reported to us, we cooperate with judicial authorities. We keep access logs for twelve months that identify the user, IP address, scanned domain, timestamp, and authorization declaration. These logs are admissible as evidence.
We enforce this policy through a combination of:
Abuse reports can be filed at abuse@mythoscansec.com. Include the offending domain and any relevant context. We investigate within 48 hours.
If you are a domain owner and you discover that someone has been scanning you through Mythoscan without your consent, contact us and we will share whatever legally permissible information we hold to help you identify and pursue the abuser.
We may update this policy to address new categories of abuse or to reflect legal developments. Updates are notified by email with at least 14 days of notice.