Home/Legal

Legal

Review the terms and policies that govern your use of Octant. Learn about your rights, our commitments, and how we protect your information.

Terms of Service Octant

Effective Date: November 15, 2025

Version: 1.0

Last Updated: November 15, 2025

Operated by: Octant Labs

Website: https://octant.app

IMPORTANT: PLEASE READ THESE TERMS OF SERVICE CAREFULLY BEFORE USING THE OCTANT PROTOCOL, WEBSITES, APPLICATIONS, OR SERVICES. BY ACCESSING OR USING ANY PART OF OUR SERVICES, YOU AGREE TO BE BOUND BY THESE TERMS.


1. EXECUTIVE SUMMARY

This summary highlights the most important aspects of Octant and the Octant Protocol. You must read the full Terms of Service; this summary is for convenience only.


🚫 NOT AN INVESTMENT PRODUCT

The Octant Protocol is a yield allocation system, not an investment platform. When you deploy assets into a Dragon Vault:

  • Your vault shares will not increase in value
  • Generated yield is allocated to a donation address, not returned to the vault

🔐 YOU CONTROL YOUR ASSETS

We never custody your funds. The Protocol operates through non-custodial smart contracts:

  • Only you control your private keys and wallet
  • We cannot access, freeze, or redirect your assets
  • All withdrawals are executed automatically by code
  • Lost private keys mean permanent loss of access

👥 MULTIPLE USER TYPES WITH DIFFERENT ROLES

The Protocol serves different participants:

  • Dragons 🐉: Deploy vaults and decide strategies
  • Regens 🌱: Participate in community allocation decisions
  • Recipients 📨: Receive yield donations
  • Each role has specific responsibilities and risks

⛔ ALL TRANSACTIONS ARE IRREVERSIBLE

Blockchain transactions cannot be undone:

  • Once confirmed, transfers are permanent and final
  • Mistaken transactions cannot be reversed
  • Double-check all addresses and amounts
  • We cannot recover lost or misdirected funds

💰 YOUR TAX RESPONSIBILITY

You handle all tax obligations:

  • Donation tax implications vary by jurisdiction
  • Yield generation may be taxable events
  • No tax advice or documentation provided
  • Consult your own tax advisor

🌍 ACCESS RESTRICTIONS APPLY

Not available everywhere:

  • Prohibited in sanctioned territories
  • VPN use to circumvent restrictions is prohibited
  • Eligibility requirements for participation

⚡ SMART CONTRACT RISKS

Experimental technology with inherent risks:

  • Smart contracts may contain bugs or vulnerabilities despite multiple audits that the Octant Protocol underwent
  • External protocols (e.g. Aave, Morpho, etc.) may fail
  • Total loss of funds is possible
  • No guarantees of functionality or returns

🤝 COMMUNITY-DRIVEN ALLOCATION

Donation decisions may be collective:

  • Dragons can enable community voting
  • Regens influence fund allocation through participation
  • Mathematical formulas determine final distributions
  • Individual control is limited in community decisions

🔄 NO CUSTOMER SUPPORT FOR BLOCKCHAIN ACTIONS

Certain actions cannot be reversed or fixed:

  • Smart contract interactions are autonomous
  • No ability to modify confirmed transactions
  • Limited support for user errors
  • You must understand the technology before using

📝 CHANGES TO TERMS

We may update these Terms at any time. Continued use after changes means acceptance. Check regularly for updates.


🆘 BEFORE YOU START

If you don't understand these concepts, DO NOT USE THE PROTOCOL:

  • Smart contracts and blockchain technology
  • DeFi protocols and yield generation
  • Non-custodial wallets and private keys
  • Gas fees and transaction costs

This Executive Summary is provided for convenience only and does not replace the full Terms of Service below. In case of any conflict, the full Terms prevail.

2. DEFINITIONS

The following definitions apply throughout these Terms of Service. Defined terms may be used in singular or plural form.


2.1 Protocol-Specific Terms

"Dragon" means an entity or individual that deploys and manages a Dragon Vault, controls yield allocation strategies, and may enable community participation in donation decisions.

"Dragon Vault" means a modified ERC-4626 vault deployed by a Dragon that accepts deposits but directs generated yield to donations rather than back to depositors, ensuring Vault Shares never appreciate in value.

"Earning Power" means the measure of a Regen's ability to earn Reward Tokens, calculated based on their Staked Regen Tokens and time staked.

"External Strategy Protocol" means third-party DeFi protocols (such as Aave, Morpho, or Sky) that receive Dragon Vault Deposit Tokens and generate yield.

"Funding Round" means a Dragon-initiated campaign with defined parameters where projects apply to receive donations from a Funding Round Wallet, with allocation potentially determined through community participation.

"Funding Round Wallet" means a wallet designated as a Direct Yield Donation Recipient that holds funds for distribution to Indirect Yield Donation Recipients based on Funding Round outcomes.

"Octant", "Octant Protocol" or "Protocol" means the suite of non-custodial smart contracts that enable yield donation through Dragon Vaults, including vault contracts, strategy contracts, payment splitters, and associated infrastructure.

"Octant Labs", "we", "us", or "our" means the entity operating the Sites and providing the Services, including the interfaces to interact with the Protocol.

"Octant Strategy SC Yield Claim Tokens" means tokens representing claims for accrued yield that can be redeemed for Yield Tokens.

"Project Registry" means the interface where projects can apply to Funding Rounds and maintain profiles for discovery by Dragons and Regens.

"Regen" means a community participant who stakes tokens and/or participates in allocation decisions through Quadratic Funding or Quadratic Voting mechanisms.

"Regen Staker Contract" means the smart contract that holds Staked Regen Tokens, tracks Earning Power, and manages Reward Token distribution to Regens.

"Reward Tokens" means tokens that accrue to Regens based on their Earning Power, which can be withdrawn, donated to projects, or compounded.

"Services" means all services provided by Octant Labs, including access to the Apps, Sites, and interfaces to interact with the Protocol, along with any associated tools, features, or functionality.

"Sites" means all websites operated by Octant Labs, including octant.app and all associated subdomains.

"Vault Shares" means ERC-20 tokens minted by Dragon Vaults representing depositors' claims on Dragon Vault Deposit Tokens

"Yield Tokens" means the base tokens in which yield accrues from External Strategy Protocols.


2.2 Standard DeFi and Blockchain Terms

"Blockchain" means a distributed, immutable digital ledger technology that records transactions across a network of computers without central authority.

"DeFi" means decentralized finance, referring to blockchain-based financial services and applications that operate without traditional intermediaries.

"Gas Fees" means transaction fees paid to Blockchain validators or miners for processing and confirming transactions on the network.

"Non-Custodial" means that no party other than the user has control over or access to the user's private keys or assets.

"Oracle" means a service that provides external data to smart contracts, such as price feeds or other off-chain information.

"Private Key" means the cryptographic key that controls access to a Blockchain wallet and must be kept secret by the user.

"Self-Custodial Wallet" or "Wallet" means software or hardware that allows users to store, send, and receive crypto-assets while maintaining sole control of private keys.

"Smart Contract" means self-executing code deployed on a Blockchain that automatically enforces agreement terms without intermediaries.

"Transaction" means any interaction with the Blockchain that changes its state, including transfers, contract deployments, or function calls.


2.3 Technical Terms

"ERC-20" means the Ethereum token standard defining a common interface for fungible tokens on Ethereum-compatible Blockchains.

"ERC-4626" means the Ethereum tokenized vault standard that the Dragon Vault architecture is based upon and modifies.

"Fork" means a change to Blockchain protocol rules that may create divergent versions of the blockchain.

"Multi-sig Wallet" means a wallet requiring multiple signatures to authorize transactions.

"Slippage" means the difference between expected and executed prices in a transaction due to market movement.


2.4 Regulatory and Compliance Terms

"AML" means Anti-Money Laundering laws and regulations.

"KYC" means Know Your Customer identity verification requirements.

"OFAC" means the U.S. Department of the Treasury's Office of Foreign Assets Control.

"Restricted Territory" means any jurisdiction where use of the Services is prohibited, including sanctioned countries and regions with regulatory restrictions.

"Sanctions Lists" means lists of prohibited persons and entities maintained by governmental authorities, including the SDN List, EU Consolidated List, and UN Security Council Sanctions List.


2.5 General Terms

"Applicable Law" means all relevant laws, regulations, rules, and legal requirements in any jurisdiction that apply to a user's use of the Services.

"Terms", "Terms of Service", or "Agreement" means this entire document including all appendices and any documents incorporated by reference.

"User", "you", or "your" means any individual or entity accessing or using the Services, whether as a Dragon, Regen, Recipient, or in any other capacity.


2.6 Interpretation Rules

In interpreting these Terms, headings are provided for convenience only and do not affect the interpretation of any provision. The word "including" means "including without limitation" unless stated otherwise. The word "or" is inclusive and means "and/or" unless the context clearly requires otherwise. Words in the singular include the plural and vice versa, and references to any gender include all genders. References to "written" communications or agreements include electronic communications and digital formats. Any examples provided throughout these Terms are illustrative only and are not exhaustive of the circumstances they describe. Technical terms not specifically defined in these Terms have their commonly accepted meanings in the Blockchain and cryptocurrency industry.


3. SCOPE AND ACCEPTANCE


3.1 Acceptance of Terms

3.1.1 Methods of Acceptance

By accessing or using any part of our Services, you acknowledge that you have read, understood, and agree to be bound by these Terms. You accept these Terms through various actions, including clicking "I Agree," "I Accept," or any similar button or checkbox that we may present to you. You also accept these Terms by accessing any Octant website, application, or interface, or by connecting your wallet to any Octant service. Acceptance occurs when you deploy a Dragon Vault or interact with the Protocol in any way, when you stake tokens in the Regen Staker Contract, or when you participate in any Funding Round as any type of user. Similarly, claiming any yield donations or rewards constitutes acceptance of these Terms. Your continued use of the Services after we provide notice of changes to these Terms also constitutes acceptance of the modified Terms.

IF YOU DO NOT AGREE TO THESE TERMS, YOU MUST NOT ACCESS OR USE THE SERVICES.

3.1.2 Capacity and Authority

You represent and warrant that you are at least 18 years old or have reached the age of majority in your jurisdiction, whichever is greater. You must have full legal capacity to enter into binding contracts and must not be prohibited from using the Services under any Applicable Law. If you are accepting these Terms on behalf of an entity, you represent that you have actual authority to bind that entity to these Terms. Your acceptance and use of the Services must comply with all Applicable Laws and regulations.

3.1.3 Role-Specific Acceptance

Different user roles imply additional specific acceptances. Dragons additionally accept full responsibility for vault configuration and management, yield generation and allocation decisions, compliance with donation regulations in their jurisdiction, and community participation settings. Regens additionally accept the terms governing staking and voting mechanisms, token lock-up conditions that may apply, participation rules, and all sybil prevention measures we may implement. Recipients additionally accept the conditions for receiving donations, any reporting requirements that may apply, restrictions on fund usage, and the procedures for withdrawing allocated funds.


3.2 Modification of Terms

3.2.1 Right to Modify

We reserve the right to modify these Terms at any time, at our sole discretion. Modifications may be necessary due to changes in Applicable Law or regulations, the introduction of new features or Services, security or operational requirements, changes to the Protocol or third-party integrations, or business or risk management needs.

3.2.2 Notice of Modifications

When we make material changes to these Terms, we will update the "Last Updated" date at the top of the document. We will provide notice of material changes through one or more methods, which may include banner notifications on the Sites, pop-up notifications in the Apps, email to registered users if we have your email address, blog posts or announcements, or required re-acceptance in the interface.

3.2.3 Effect of Continued Use

Your continued use of the Services after Terms modification constitutes acceptance of the new Terms. If you do not agree to the modified Terms, you must immediately stop using all Services. You may withdraw any deposited assets subject to Protocol rules. The previous Terms will govern actions taken before the modification, and some provisions may survive termination as specified in Section 22.

3.2.4 Retroactive Changes

We will not make retroactive changes that adversely affect your accrued rights, change the fundamental nature of past transactions, alter the non-custodial nature of the Protocol, or modify locked token conditions without your consent.


3.3 Relationship to Other Documents

3.3.1 Incorporated Documents

These Terms incorporate by reference several additional documents. Our Privacy Policy governs data collection and use. Our Cookie Policy explains website cookie usage. Developer Documentation provides technical specifications and guides.

3.3.2 Order of Precedence

In case of conflicts between documents, specific provisions prevail over general ones, meaning role-specific terms override general terms. These Terms prevail over any other Octant Labs documents. Separately executed written agreements may supersede these Terms where explicitly stated. For smart contract functionality, the Protocol code is determinative of actual operation.

3.3.3 Third-Party Terms

Your use of the Services involves acceptance of various third-party terms. These include terms from wallet providers such as MetaMask or WalletConnect, external strategy protocols like Aave, Morpho, or Sky, Blockchain networks including Ethereum and others and infrastructure providers including IPFS and cloud services. We are not a party to and are not responsible for these third-party terms.


3.4 Binding Agreement

3.4.1 Legal Contract

THESE TERMS CONSTITUTE A LEGALLY BINDING CONTRACT. This Agreement is enforceable in courts and arbitration, creates legal obligations and rights for both Parties, may be used as evidence in disputes, survives termination for relevant provisions, and remains valid even if any particular provision is found invalid and must be severed.

3.4.2 Entire Agreement

These Terms, together with any documents incorporated by reference, constitute the entire agreement between you and Octant Labs regarding the Services. They supersede all prior oral or written communications, representations or warranties, understandings or agreements, marketing materials or descriptions, and any draft or prior versions of terms.


3.6 Geographic Scope

The Services are intended for global use except where prohibited by law or regulation. You acknowledge that access to the Services does not imply legality in your jurisdiction, and you must determine your own local law compliance. Some features may be geographically limited, and restrictions may change without notice.


3.7 Acceptance Warnings

BY ACCEPTING THESE TERMS, YOU ACKNOWLEDGE:

The Protocol is designed for yield allocations, not investment, and you will receive no returns as yield is donated away rather than returned to depositors. All blockchain transactions are irreversible and cannot be undone once confirmed. You may lose all deposited assets with limited ability to recover any losses. You bear all risks and obligations associated with using the Services.

EXPERIMENTAL TECHNOLOGY: You understand that blockchain and smart contracts are experimental technologies with inherent risks including total failure.


3.8 Periodic Review

You agree to review these Terms periodically for changes and check the "Last Updated" date regularly. You will monitor our announcements for modifications, maintain current contact information if provided to us, and stay informed about Protocol updates. Your continued use of the Services constitutes ongoing acceptance of the current Terms.


4. PROTOCOL OVERVIEW


4.1 What is the Protocol

The Protocol consists of open-source, non-custodial smart contracts deployed on Ethereum that enable users to connect with yield-generating DeFi protocols and direct generated yield it to third-party recipients rather than retaining it themselves. The Protocol operates autonomously without central control or intermediary involvement.

Through the Protocol, users may deploy vaults, generate yield through third-party strategies, and allocate generated returns to designated beneficiaries. The specific features and functionalities available may vary and evolve over time as the Protocol develops and as new strategies become available.


4.2 Non-Investment Nature

THE PROTOCOL IS NOT DESIGNED OR INTENDED AS AN INVESTMENT PRODUCT.

The Protocol facilitates the allocation of generated yield to third parties rather than returning it to depositors. Users who deposit assets should not expect financial returns, appreciation, or profit from their participation. Any yield generated through the Protocol is automatically allocated to designated recipients according to the configuration chosen by the vault deployer.

By using the Protocol, you acknowledge that your participation is not for investment purposes and that you have no expectation of profit from your deposits. You understand that while your principal may be withdrawable subject to Protocol conditions, any yield generated will be directed entirely to third-party recipients.


4.3 Protocol vs Interface Distinction

The Protocol and the Interface are separate and distinct components that serve different functions. The Protocol comprises autonomous smart contracts that operate independently according to their programmed logic. Once deployed, these smart contracts function automatically.

The Interface consists of websites and applications that we operate to provide one convenient means of interacting with the Protocol. However, we operate only the Interface and do not control the underlying Protocol itself. The Protocol can be accessed through various means, including direct smart contract interaction, command line interfaces, or third-party interfaces developed by others. We may modify, update, or discontinue the Interface at any time without affecting the Protocol's autonomous operation.


4.4 Decentralized and Non-Custodial Nature

The Protocol operates in a fully decentralized and non-custodial manner, meaning that at no point do we or any other party take custody or control of user assets. We do not control or custody user assets, nor do we have the ability to reverse, modify, or cancel transactions once they are initiated. We do not operate or control the underlying smart contracts after deployment, as they function autonomously according to their code. We have no access to users' private keys and cannot access funds or authorize transactions on behalf of users. Furthermore, we cannot direct or influence Protocol operations once smart contracts are deployed.

Users maintain sole and exclusive control over their assets and all interactions with the Protocol. This non-custodial architecture means that users bear full responsibility for the security of their wallets and the consequences of their transactions.


4.5 No Guarantees

We make no guarantees, representations, or warranties regarding any aspect of the Protocol's operation or performance. Specifically, we do not guarantee that the Protocol will function as intended or remain available at any particular time. We make no assurances about yield generation, including whether yield will be generated at all or in what amounts. Strategy performance may vary significantly and may result in losses rather than gains. We cannot guarantee the preservation of your assets, as total loss is possible due to various risks including smart contract failures, external protocol failures, or market conditions. Technical reliability is not assured, as the Protocol may experience bugs, failures, or unexpected behaviors. We make no commitment to the continued operation of the Protocol or the Interface, either of which may cease functioning at any time.

The Protocol involves experimental blockchain technology with inherent and substantial risks, including the potential for total and permanent loss of all deposited assets. You must carefully consider these risks before interacting with the Protocol.

5. USER ROLES AND RESPONSIBILITIES


5.1 General User Responsibilities

All users of the Services, regardless of their specific role, must ensure their use complies with all applicable laws and regulations in their jurisdiction. You are responsible for maintaining exclusive control over your private keys and wallet credentials, and you must never share these with anyone. Before interacting with the Protocol, you must understand the risks and functionality involved in your intended use. When required to provide information, you must ensure all information is truthful, accurate, and complete. You are obligated to carefully review and confirm all transaction details before execution, as blockchain transactions are irreversible. You bear sole responsibility for determining and fulfilling any tax obligations arising from your activities with the Protocol. Additionally, you must accept and comply with the terms of any integrated third-party services you interact with through the Protocol.

You acknowledge that we cannot and do not control user actions or ensure user compliance with these responsibilities. Each user acts independently and must ensure their own compliance.


5.2 Different User Types

The Protocol accommodates different types of participants, each with varying capabilities and specific responsibilities.

5.2.1 Vault Deployers (Dragons)

Users who deploy vaults through the Protocol accept complete responsibility for their configuration decisions and all consequences that flow from those decisions. This includes the selection of yield generation strategies and all associated parameters. Vault deployers bear full responsibility for their allocation determinations, including how generated yield will be distributed among recipients. They must ensure compliance with all applicable donation and charity regulations in their jurisdiction and any jurisdictions where recipients are located. Vault deployers must understand that deployment decisions may be irrevocable and that smart contracts, once deployed, may not be modifiable.

5.2.2 Community Participants (Regens)

Users who participate in governance or allocation mechanisms acknowledge that participation rules and requirements may vary depending on the specific mechanism and may change over time. Lock-up or staking periods may apply to tokens used for participation, during which tokens cannot be withdrawn. Voting or allocation power may be limited, weighted, or diluted based on various factors including the amount staked, time staked, or mathematical formulas designed to prevent centralization of power. Decisions made through these mechanisms may be binding and irreversible once voting periods conclude. Community participants understand that rewards or incentives, if any, are not guaranteed and may vary significantly or be zero.

5.2.3 Recipients

Entities or individuals receiving allocations understand that specific eligibility requirements may apply and that meeting these requirements does not guarantee funding. Application or registration procedures may be required, and recipients must provide accurate information throughout these processes. Allocations are never guaranteed, and amounts may vary significantly based on available funds, community decisions, and other factors. Recipients must comply with all applicable legal and regulatory obligations related to receiving donations in their jurisdiction. They must actively follow claiming procedures within specified timeframes or risk forfeiting allocations.


5.3 No Fiduciary Relationship

NO FIDUCIARY DUTIES OR RELATIONSHIPS EXIST BETWEEN ANY PARTIES.

The relationship between all users is strictly at arm's length. Vault deployers have no fiduciary duty to other participants and make decisions solely based on their own objectives and preferences. We have no fiduciary duty to any user and do not act as your advisor, agent, or trustee. Community participants have no duty to recipients or to each other when making allocation decisions. All parties interact independently, pursuing their own interests without obligation to consider the interests of others.

Each user must make independent decisions based on their own research, risk tolerance, and objectives. Each user bears sole responsibility for the outcomes of their actions and cannot rely on any other party to protect their interests.


5.4 User Capabilities and Limitations

5.4.1 Permitted Actions

Subject to Protocol rules and these Terms, users may deploy vaults with parameters of their choosing, though these choices are constrained by available options within the Protocol. Users may participate in available mechanisms according to the rules governing each mechanism. They may withdraw assets they control, subject to any lock-up periods, liquidity availability, and smart contract conditions. Users may access public information about the Protocol and its operations through the blockchain and our interfaces. They may interact with the Protocol through available interfaces or directly with smart contracts.

5.4.2 No Right to Demand

Users have no right to demand specific features or functionality beyond what is currently available in the Protocol. No user can require changes to Protocol operation, as smart contracts are immutable once deployed. Users cannot demand particular outcomes or results from their participation, as outcomes depend on multiple factors including market conditions, other users' actions, and autonomous smart contract operations. Users have no right to support or assistance beyond what we choose to offer at our discretion. No user can demand modifications to smart contract logic, as this is technically impossible after deployment.

5.4.3 Risk Assumption

Each user, regardless of role, explicitly assumes all risks associated with their participation in the Protocol. Every user accepts that the technology is experimental and may fail completely or behave unexpectedly. All users understand and accept the potential for total loss of any assets they commit to the Protocol. Users acknowledge the absence of any guarantees regarding Protocol performance, yield generation, or asset preservation. By using the Protocol, users waive any claims against us arising from normal Protocol operation or failures.


5.5 Prohibited Conduct

You may not misrepresent your identity, authority, or affiliations when using the Services or interacting with other users. Providing false or misleading information in any context, including applications, registrations, or user profiles, is strictly prohibited. You may not attempt to manipulate or game any Protocol systems, including voting mechanisms, allocation formulas, or yield distribution systems. You must respect the rights of other users and may not interfere with their legitimate use of the Protocol. Any illegal or fraudulent activity is strictly prohibited and will result in immediate termination of access. You may not attempt to circumvent security measures, access controls, or any restrictions we implement. Any action that interferes with the proper operation of the Protocol or degrades the experience of other users is prohibited.


5.6 Specific Acknowledgments by User Type

5.6.1 For Asset Depositors

If you deposit assets into the Protocol, you acknowledge that deposits may be irreversible depending on Protocol conditions and smart contract rules. You understand that any yield generated will not return to you but will instead be directed to designated recipients according to vault configurations. Your principal may be at risk due to various factors including smart contract vulnerabilities, strategy failures, or external protocol risks. Withdrawal ability depends on available liquidity and may be delayed or impossible under certain conditions. You have no expectation of investment returns, as this is a donation protocol, not an investment vehicle.

5.6.2 For Participants in Allocation Mechanisms

If you participate in voting or allocation decisions, you understand that your individual influence may be limited by design to prevent centralization of power. Outcomes depend on collective decisions of all participants, and mathematical formulas such as quadratic voting may be applied to weight contributions. These formulas are designed to achieve specific goals such as preventing whale domination and may not reflect linear voting power. Gaming prevention measures are implemented and attempts to circumvent them may result in exclusion. Participation requirements may change between rounds or over time as the Protocol evolves.

5.6.3 For Recipients

If you receive allocations from the Protocol, you acknowledge that allocation amounts are variable and depend on factors outside your control, including available funds, community decisions, and participation levels. You are responsible for actively claiming allocations within specified timeframes and understand that unclaimed funds may be redistributed or returned. You understand that receiving donations may have tax implications in your jurisdiction and you are solely responsible for compliance. Various compliance obligations may apply depending on your entity type and jurisdiction. Future allocations are never guaranteed regardless of past funding received.


5.7 Independence and Autonomy

All users function as independent actors who make their own decisions without reliance on others. Each user must conduct their own research and due diligence before participating in any aspect of the Protocol. Users bear their own risks and cannot transfer these risks to other participants or to us. Each user must independently manage their compliance with applicable laws and regulations. No user can bind or obligate other users through their actions or decisions.

We do not endorse, control, or take responsibility for any user's decisions or actions. Each user's participation is voluntary and based on their own judgment.


5.8 Evolving Roles and Features

The Protocol and Services will continue to evolve and may introduce new user types or roles not currently contemplated. Existing capabilities may be modified or restricted based on regulatory requirements, security needs, or Protocol development. Additional mechanisms or features may be added that create new forms of participation. Parameters and requirements governing participation may change as the Protocol matures and adapts to user needs. Different participation options may become available as the ecosystem develops.

Users must stay informed of relevant changes affecting their participation and adjust their activities accordingly. Changes may occur without individualized notice, and users are responsible for monitoring updates.


5.9 No Partnership or Joint Venture

Nothing in these Terms or your use of the Services creates any form of partnership between users or between users and us. No joint venture is formed through Protocol participation. No agency relationship exists where one user can act on behalf of another. No employment relationship is created regardless of the level of participation or rewards received. No fiduciary relationship exists between any parties.

All users interact as independent parties pursuing their own interests without obligation to or reliance on others.


5.10 Responsibility for Associates

If you permit or enable others to use the Services through your access, you assume full responsibility for ensuring their compliance with these Terms. You are liable for all actions and omissions of anyone using your access credentials or acting under your authority. You must ensure that any person you authorize understands all risks associated with Protocol use. You remain fully accountable for all activity conducted through your access, regardless of whether you personally initiated the activity.

We strongly recommend that each user maintain their own independent access to prevent complications and ensure clear accountability.


6. SERVICES AND FUNCTIONALITY


6.1 Overview of Services

We deployed the Protocol and provide interfaces and tools that enable users to interact with the Protocol and related functionalities. These Services include websites, applications, and other resources that facilitate access to the Protocol’s decentralized smart contracts. The Services are provided "as is" without any warranties and may be modified, suspended, or discontinued at any time without prior notice or liability to you.

The Services provide a means of accessing and interacting with the underlying Protocol, but it is important to understand that the Services themselves do not constitute the Protocol. The Protocol exists independently on the blockchain and can function without our Services.


6.2 Available Functionalities

Through the Services, users may access various functionalities designed to facilitate interaction with the Protocol. These functionalities include vault operations that allow you to deploy, configure, and manage vaults according to your preferences. Asset management features enable you to deploy, withdraw, and monitor assets within the Protocol. You may select from available yield generation strategies through our strategy selection tools, and use allocation tools to direct generated yield to designated recipients according to your chosen parameters.

The Services also provide participation mechanisms that allow eligible users to engage in community decision processes, including quadratic funding and voting mechanisms. Information display features show data about vaults, strategies, and allocations, while registry access allows you to browse and interact with participant registries to discover projects and funding opportunities.

Available functionalities may vary significantly based on your user type, your jurisdiction, the evolution of the Protocol, and our operational decisions. We make no commitment to maintaining any particular functionality and may add, modify, or remove features at our discretion.


6.3 Interface Applications

6.3.1 Web Interfaces

We provide web-based interfaces that enable you to connect compatible wallets to interact with the Protocol. Through these interfaces, you can interact with smart contracts, view Protocol information, execute transactions subject to blockchain confirmation, and access documentation and educational resources. These web interfaces are designed for convenience but are not the exclusive means of Protocol interaction.

6.3.2 Administrative Tools

Certain users, particularly those deploying and managing vaults, may access specialized administrative tools. These tools provide functionality for vault configuration, parameter management, allocation settings, and monitoring functions. Access to administrative tools is role-based and may require additional verification or eligibility requirements.

6.3.3 Information Services

The Services display various types of information to help users understand Protocol operations. This includes Protocol statistics showing aggregate activity and performance, transaction history for your interactions, performance metrics for strategies and vaults, user dashboards displaying personalized information, and educational content to help understand the Protocol. All information displayed is provided for convenience only and may not be complete, current, or accurate. You should not rely solely on displayed information for critical decisions.


6.4 Third-Party Integrations

The Services integrate with numerous third-party protocols and services to provide comprehensive functionality. These integrations include DeFi protocols such as Aave, Morpho, and Sky for yield generation strategies, wallet providers like MetaMask and WalletConnect for asset custody and transaction signing, various blockchain networks for transaction processing, data providers for price feeds and other market information, and infrastructure services for hosting and performance optimization.

We do not control, endorse, or guarantee any third-party services integrated with our Services; please see our disclaimer here. These third parties operate independently, maintain their own terms of service, and may change or discontinue their services without notice. Your use of third-party services is at your own risk, and we are not responsible for any losses or damages resulting from third-party failures or changes.


6.5 Service Limitations

6.5.1 No Custody or Control

The Services are strictly non-custodial interfaces. We do not take custody of user assets at any time. The Services cannot execute transactions independently without your explicit authorization, do not store or have access to your private keys, and cannot direct or redirect fund movements within the Protocol. All asset control remains exclusively with users.

6.5.2 Interface vs Execution

It is critical to understand the distinction between what the Services provide and what actually occurs on-chain. The Services facilitate but do not perform Protocol operations - actual execution happens through autonomous smart contracts. We display information but do not guarantee its accuracy or completeness. The Services enable you to make decisions but do not control those decisions or their outcomes. We provide access to the Protocol but cannot guarantee specific results or outcomes from your interactions.

6.5.3 Availability and Access

We make no guarantees regarding Service availability or performance. We do not guarantee continuous availability or uptime, uninterrupted access to features, error-free operation of any component, complete functionality at all times, or consistent performance across different conditions. The Services may experience downtime, errors, or complete failure without warning.


6.6 User-Generated Content and Data

Users may submit or generate various types of content through the Services, including profile information for identification and participation, project descriptions for funding applications, transaction data through Protocol interactions, and participation records from governance activities.

By submitting any content through the Services, you grant us a worldwide, non-exclusive, royalty-free, perpetual, irrevocable license to use, reproduce, modify, display, and distribute such content for Service operation and improvement. You remain responsible for ensuring the accuracy and legality of all your submissions. You represent that you have the right to submit such content and that it does not violate any third-party rights or applicable laws.


6.7 Modifications and Updates

We reserve the absolute right to modify any aspect of the Services at any time without prior notice. This includes the right to modify Service features or functionality, update interfaces and user experience, change available functionalities or access methods, add or remove third-party integrations, and adjust access requirements or eligibility criteria. Your continued use of the Services after any modifications constitutes acceptance of such changes.


6.8 Access Requirements

To use the Services effectively, you must meet certain requirements and maintain necessary technical capabilities. You must satisfy all eligibility requirements outlined in these Terms, use compatible technology including supported browsers and devices, maintain reliable internet connectivity, have a compatible Web3 wallet, and accept applicable third-party terms for integrated services.

Technical requirements may be specific and include particular supported browsers and versions, minimum system specifications for optimal performance, network compatibility with supported blockchains, and wallet standards such as ERC-20 token support. We may update technical requirements at any time, and failure to meet updated requirements may result in inability to access certain Services.


6.9 [intentionally empty]


6.10 Support and Assistance

6.10.1 Available Support

We may provide certain support resources including documentation and guides for Service usage, FAQ resources addressing common questions, community forums for peer support, and contact channels for specific inquiries. The availability and extent of support resources may vary and change over time.

6.10.2 No Guaranteed Support

We make no guarantees regarding support services. We do not guarantee any specific response times to inquiries, successful problem resolution, individual assistance for specific issues, comprehensive technical support, or recovery services for lost assets or failed transactions. Support services cannot reverse blockchain transactions, recover lost assets, or restore access to wallets for which you have lost credentials.


6.11 Educational and Informational Content

The Services may include various educational and informational content such as educational materials about blockchain and DeFi concepts, risk disclosures regarding Protocol usage, technical documentation for advanced users, market information and statistics, and third-party content and analysis. All such content is provided for informational purposes only and does not constitute professional advice of any kind, including investment, financial, tax, or legal advice. You should not rely on such content as the sole basis for any decisions.


6.12 Service Restrictions

We may restrict or terminate access to the Services for any user who violates these Terms, engages in prohibited activities, presents legal or regulatory risks to us or other users, abuses the Services or uses them in unintended ways, or attempts unauthorized access to systems or data.

Restrictions may take various forms including blocking access to interfaces, limiting available features or functionality, suspending user accounts or access credentials, or implementing IP address banning. It is important to note that restrictions on Service access do not prevent direct interaction with the Protocol through other means, as the Protocol operates autonomously on the blockchain.


6.13 Beta Features and Testing

We may occasionally offer beta features, test environments, experimental functions, or preview releases of new capabilities. These features involve significantly elevated risks beyond standard Services and may contain undiscovered bugs or errors, change substantially or without notice, result in unexpected losses or failures, or be discontinued entirely without warning. Your use of any beta features is entirely at your own risk, and we strongly recommend using only test assets when exploring experimental features.


6.14 Data and Analytics

The Services may collect and display various data and analytics derived from public blockchain information, including aggregate Protocol metrics showing overall usage patterns, transaction volumes and values, user statistics and participation rates, and performance data for strategies and vaults. This data is derived from public blockchain records and is provided as-is without warranties. It may be potentially incomplete or delayed, and we do not guarantee the accuracy of any displayed analytics or metrics.


6.15 No Warranty of Compatibility

We make no warranties that the Services will be compatible with all systems or accessible in all contexts. Specifically, we do not guarantee compatibility with all wallet types or providers, all browsers or browser versions, all devices or operating systems, all blockchain networks or protocols, or all jurisdictions and regulatory environments. Users are solely responsible for ensuring their own technical and legal compatibility with the Services before attempting to use them.

7. NON-CUSTODIAL NATURE AND WALLET SECURITY


7.1 Non-Custodial Architecture

7.1.1 No Custody of Assets

WE NEVER HAVE CUSTODY, POSSESSION, OR CONTROL OF YOUR ASSETS.

The Protocol operates on a strictly non-custodial basis. Your assets remain in smart contracts that only you control through your private keys. Only you can authorize transactions from your wallet, and we cannot access, freeze, or redirect your funds under any circumstances. We have no ability to reverse or cancel your transactions once they are broadcast to the blockchain, nor can we recover lost or misdirected assets.

7.1.2 Direct Smart Contract Interaction

When you use the Services, you interact directly with autonomous smart contracts on the blockchain. These transactions execute according to immutable coded logic without any intermediary controlling the process. Settlement is automatic and immediate based on the smart contract's programmed rules, and all outcomes are determined by code, not by human discretion or intervention.

7.1.3 Implications of Non-Custody

Because we have no custody of your assets, we cannot help if you lose access to your wallet, nor can we stop unauthorized transactions if your wallet is compromised. We cannot recover stolen funds, modify smart contract outcomes, or provide traditional customer protections that centralized services might offer. You bear full responsibility for your asset security.


7.2 Self-Custodial Wallet Requirements

7.2.1 Wallet Necessity

To interact with the Protocol, you must use a self-custodial wallet that you control exclusively. This wallet must support the required token standards for the Protocol and be capable of interacting with smart contracts on the relevant blockchain networks. Your wallet must also maintain sufficient balance for transaction fees (gas) and any other operational requirements.

7.2.2 Wallet Provider Independence

Your wallet is provided by third parties completely independent of us. We do not recommend specific wallet providers, nor do we control wallet functionality or features. We are not responsible for the security of third-party wallet software, and we cannot resolve wallet-related issues or disputes. Any terms of service or agreements regarding your wallet are solely between you and your wallet provider.

7.2.3 Wallet Connection Risks

When connecting your wallet to our Services, you must verify that you are on the correct website URL and check for a secure HTTPS connection. Always review transaction details carefully before confirming, and ensure you understand the implications of any token approvals you grant. Be constantly aware of phishing risks and fraudulent websites that may attempt to steal your credentials. Never share your seed phrase or private keys with anyone, including us or anyone claiming to represent us.


7.3 Private Key Responsibility

7.3.1 Exclusive Control

YOUR PRIVATE KEYS = YOUR SOLE RESPONSIBILITY

Only you should ever know your private keys or seed phrase. Loss of your keys means permanent and irreversible loss of access to your assets. If your keys are stolen, attackers gain complete control over your assets and can drain your wallet entirely. We never need your private keys for any reason, and no legitimate service or support representative will ever request them.

7.3.2 Security Best Practices

You should store your keys offline in secure physical locations and use hardware wallets for significant amounts of cryptocurrency. Never share your keys via email, messaging applications, websites, or any digital communication method. Maintain multiple secure backups of your keys in different physical locations to protect against loss. Use strong, unique passwords for any encrypted storage of keys, and enable additional security features such as two-factor authentication wherever available.

7.3.3 Key Compromise Consequences

If your private keys are compromised, attackers can steal all assets in your wallet and any assets accessible through approved contracts. These transactions cannot be reversed by us or anyone else once confirmed on the blockchain. We have no ability to freeze accounts or stop transactions in progress. Legal recourse against attackers is often limited or impossible, especially across international boundaries. Recovery of stolen assets is generally impossible. You must protect your keys with the same diligence you would use for large amounts of cash or valuable physical assets.


7.4 Irreversible Transactions

7.4.1 Permanent Nature

ALL BLOCKCHAIN TRANSACTIONS ARE FINAL AND IRREVERSIBLE.

Once a transaction is confirmed on the blockchain, it cannot be canceled, reversed, or modified by anyone. Mistakes in addresses or amounts cannot be corrected after confirmation. Funds cannot be returned automatically through the Protocol if sent to the wrong recipient. Disputes between parties cannot result in transaction reversal through the Protocol, and technical support cannot help recover assets from confirmed transactions.

7.4.2 Pre-Transaction Verification

Before confirming any transaction, you must verify recipient addresses character by character, as even a single incorrect character will result in permanent loss. Carefully confirm all transaction amounts and decimal places. Review the gas fees to ensure they are reasonable for current network conditions. Understand the full scope of any token approvals you are granting to smart contracts. Verify you have selected the correct blockchain network, as sending assets on the wrong network results in permanent loss. For large amounts, consider sending a small test transaction first to verify the recipient address.

7.4.3 Common Irreversible Mistakes

Permanent losses commonly result from sending assets to incorrect addresses, including small typos or clipboard malware that changes addresses. Using incorrect networks for transfers, such as sending tokens on the wrong blockchain, results in irreversible loss. Approving malicious contracts can result in immediate theft of all approved tokens. Setting inappropriate parameters in complex transactions can result in unintended outcomes. Misunderstanding transaction effects, especially in complex DeFi interactions, can lead to permanent losses. Once any of these errors are executed and confirmed on the blockchain, they cannot be undone.


7.5 Wallet Security Threats

7.5.1 Common Attack Vectors

You must be aware of various threats to wallet security. Phishing attacks involve fake websites that appear legitimate but steal your credentials when entered. Malware can infect your computer to steal private keys or modify clipboard contents when copying addresses. Social engineering attacks involve scammers impersonating support staff or other trusted parties to request your private keys. Supply chain attacks compromise wallet software at the source before you download it. Physical theft of hardware wallets or written backups can result in total loss of funds.

7.5.2 Security Indicators

Warning signs that your wallet may be compromised include unexpected transaction prompts when you haven't initiated any action, unfamiliar transaction history appearing in your wallet, missing funds without your authorization, changed wallet settings you didn't modify, or unusual patterns of activity in your transaction history. If you notice any of these indicators, you must act immediately to secure any remaining assets.

7.5.3 Incident Response

If you believe your wallet has been compromised, remain calm and act methodically. Immediately transfer any remaining assets to a new secure wallet with a different seed phrase. Revoke all token approvals for the compromised wallet using appropriate tools. Document the incident thoroughly, including transaction hashes, timestamps, and amounts. Report the incident to relevant authorities, though recovery is unlikely. Review the incident to understand how the compromise occurred and improve your security practices. While we cannot assist with asset recovery, we may be able to provide general guidance on security best practices.


7.6 Transaction Approval Management

7.6.1 Token Approvals

Smart contract interactions often require you to approve the contract to spend your tokens on your behalf. You may grant unlimited approvals allowing contracts to spend any amount, or limited approvals for specific amounts. Some interactions require per-transaction consent, while others establish ongoing permissions that persist until revoked. You must understand exactly what you're approving before confirming any transaction.

7.6.2 Approval Risks

Excessive token approvals can enable unauthorized transfers if contracts are compromised or malicious. These approvals persist beyond their intended use and remain active until explicitly revoked. Over time, you may accumulate many active approvals you've forgotten about, creating multiple attack surfaces for potential exploits.

7.6.3 Approval Hygiene

Maintain security by granting only the minimal necessary approvals for each transaction. Regularly review and revoke unused approvals to reduce attack surface. Use approval management tools to monitor active approvals across different protocols. Consider using limited approvals instead of unlimited ones, even if it requires more frequent transactions.


7.7 Multi-Signature and Smart Contract Wallets

7.7.1 Enhanced Security Options

Advanced wallet types such as multi-signature wallets may provide enhanced security through features requiring multiple signatures to authorize transactions, time delays before large transfers execute, spending limits that restrict daily or per-transaction amounts, and recovery mechanisms in case of key loss. These features can provide additional protection against both external attacks and user error.

7.7.2 Compatibility Considerations

Not all wallet types may be fully compatible with the Protocol. Some Protocol features may not work correctly with smart contract wallets. Gas costs are typically higher for multi-signature transactions. The additional complexity may increase the risk of user error. Recovery procedures differ significantly from basic wallets and may be more complex. You should verify compatibility with the Protocol before using advanced wallet types for significant amounts.


7.8 No Recovery Services

7.8.1 What We Cannot Do

We cannot recover lost passwords or private keys under any circumstances. We cannot reverse confirmed transactions on the blockchain. We cannot retrieve funds sent to incorrect addresses. We have no ability to access your wallet or reset your account. We cannot provide replacement assets for any losses you experience.

7.8.2 Your Recovery Responsibility

You must maintain secure backups of your private keys and recovery phrases. Document all recovery information and store it securely. Regularly test your recovery procedures to ensure they work. Plan for emergency scenarios including incapacitation or death. Accept that permanent loss of assets is a real risk that you must manage independently.


7.9 Third-Party Wallet Risks

Your wallet provider may experience security breaches that compromise user funds. Wallet services may be discontinued without warning. Features and functionality may change in ways that affect your usage. Technical issues with wallet software may prevent access to your funds. Wallet providers may implement restrictions based on regulatory requirements or business decisions. These wallet-related risks are separate from and additional to Protocol risks.


7.10 Security Acknowledgments

By using the Services, you acknowledge that you alone are responsible for your wallet security and the protection of your private keys. You understand that lost keys mean permanent and irreversible asset loss with no possibility of recovery. You accept that we cannot recover or reverse anything once transactions are confirmed on the blockchain. You acknowledge that wallet compromise is entirely your risk to manage, and that maintaining proper security practices is solely your obligation.

8. FEES AND COSTS


8.1 No Protocol Access Fees

8.1.1 Current Fee Structure

We do not currently charge fees for accessing the Services, using the Interface, interacting with the Protocol, deploying vaults, or participating in allocation mechanisms. This fee-free structure allows users to engage with the Protocol without additional costs beyond necessary network fees.

8.1.2 Future Changes

We reserve the right to implement fees in the future with prior notice to users. Any such fees would be clearly disclosed before implementation and would apply only to usage occurring after the fee implementation date. These fees would be separate from and in addition to blockchain network fees, and would be payable through mechanisms we specify at the time of implementation.


8.2 Blockchain Network Fees (Gas)

8.2.1 Required Network Fees

ALL BLOCKCHAIN TRANSACTIONS REQUIRE NETWORK FEES, COMMONLY KNOWN AS "GAS."

These fees are paid directly to blockchain validators or miners who process and confirm transactions, not to us. Network fees vary significantly based on network congestion and can change rapidly between the time you initiate and complete a transaction. You must pay gas fees for every transaction on the blockchain, regardless of transaction size or type. These fees cannot be waived, refunded, or recovered under any circumstances, and are required regardless of whether your transaction succeeds or fails.

8.2.2 Gas Fee Volatility

Network fees exhibit extreme volatility that can significantly impact the cost of using the Protocol. During periods of high network demand, gas fees can spike dramatically, sometimes exceeding the value of the transaction itself. The actual fee you pay may differ substantially from initial estimates due to changing network conditions. Different blockchain networks have varying fee structures and volatility patterns. Network congestion can make transactions prohibitively expensive, effectively preventing smaller transactions from being economical.

You are solely responsible for all network fees required for your transactions, regardless of their amount.

8.2.3 Failed Transaction Fees

Gas fees are consumed by the network even when transactions fail. Common failure scenarios that still incur gas costs include insufficient token balance to complete the transaction, smart contract reversions due to unmet conditions, network issues that prevent transaction completion, incorrect parameters that cause transaction failure, and exceeded slippage limits in trading transactions.

Failed transactions consume gas fees that are non-refundable, as validators must still process the failed transaction attempt.


8.3 Third-Party Protocol Fees

8.3.1 External Strategy Fees

Integrated third-party protocols may charge various fees for their services. These include management fees calculated as a percentage of assets under management, performance fees taken from generated yields, withdrawal fees charged when removing assets, trading fees for swap operations, and liquidity provision fees for participating in pools. These fees are determined independently by third parties, deducted automatically by their smart contracts, not controlled or influenced by us, subject to change according to third-party governance, and should be understood through the third party's own documentation.

8.3.2 No Control Over External Fees

We have no control over fees charged by external protocols. We do not set, influence, or negotiate third-party fee rates. We do not receive any portion of fees paid to third parties. We cannot guarantee or predict third-party fee amounts or changes. We do not have the ability to waive or refund third-party fees.

You must review and understand third-party fee structures before using any integrated strategies.


8.4 [intentionally empty]


8.5 Tax Obligations and Costs

8.5.1 Tax Responsibility

YOU ARE SOLELY RESPONSIBLE FOR ALL TAX OBLIGATIONS ARISING FROM YOUR USE OF THE PROTOCOL.

Tax costs may arise from various Protocol interactions including depositing or withdrawing assets, which may trigger taxable events in your jurisdiction. Yield generation may be treated as income for tax purposes. Token rewards received through participation may be immediately taxable. Allocation participation may have tax consequences depending on your role. Donation receipt may create tax obligations or benefits depending on your status and jurisdiction.

8.5.2 Tax Complexity

The tax implications of Protocol use are complex and jurisdiction-specific. You may face income tax on yields even if they are donated to third parties. Capital gains taxes may apply to asset appreciation or disposition. Donation deductions may or may not be available depending on recipient status and your jurisdiction. Cross-border participation may trigger obligations in multiple jurisdictions. Various reporting requirements may apply to your activities.

You must consult qualified tax advisors to understand your specific situation and obligations.

8.5.3 No Tax Services

We do not and cannot provide tax advice or guidance for any jurisdiction. We do not generate tax documentation or tax forms. We do not withhold taxes on behalf of users or tax authorities. We do not file tax reports except as legally required for our own obligations. We cannot provide tax optimization strategies or structures.


8.6 Hidden and Indirect Costs

8.6.1 Slippage and Price Impact

Transactions may incur indirect costs that are not immediately apparent. Price slippage can occur between transaction initiation and execution. Large transactions may have significant market impact that affects execution price. Timing differences in transaction processing can result in unfavorable prices. Exchange spreads between bid and ask prices represent hidden costs. Limited liquidity can increase the effective cost of transactions.

8.6.2 Opportunity Costs

Participation in the Protocol involves opportunity costs that should be considered. Assets locked in vaults cannot be deployed elsewhere for potentially higher returns. Alternative yield opportunities are foregone while participating in the Protocol. Liquidity limitations may prevent you from accessing assets when needed. The time value of locked assets represents an economic cost.

8.6.3 Technical Costs

Additional technical costs may accumulate through Protocol use. Multiple transactions may be required to complete operations, each incurring gas fees. Token approval transactions are required before many operations. Claiming transactions are needed to receive allocations. Migration costs may be incurred if vault strategies change. Emergency withdrawals may require additional transactions and fees.


8.7 Fee Estimation and Disclosure

8.7.1 Fee Estimates

The Services may display fee estimates to help you evaluate transaction costs. However, these estimates are approximations only and may differ significantly from actual costs. Estimates cannot account for all variables including network congestion changes, third-party fee modifications, or market movements. Fee estimates change rapidly and continuously. You should not rely solely on estimates for decision-making.

8.7.2 User Due Diligence

Before initiating any transaction, you should review all applicable fees across all involved protocols and services. You must understand the complete fee structure including both explicit and implicit costs. Calculate the total expected cost including gas, protocol fees, and third-party fees. Consider alternative approaches that might reduce costs. Accept that fee volatility may cause actual costs to exceed estimates.


8.8 No Fee Guarantees

We make no guarantees regarding fees or costs. We do not guarantee maximum fee amounts or impose fee limits. Fee stability is not assured and fees may change without warning. We cannot cap or limit transaction costs. Network fee reasonableness is beyond our control. Third-party fee rates may change at any time.

All fees are subject to change without notice based on network conditions, third-party decisions, and other factors outside our control.


8.9 Payment Methods

8.9.1 Cryptocurrency Only

All fees must be paid in cryptocurrency. Network fees must be paid in the native token of the respective blockchain.

8.9.2 Automatic Deduction

Fees are typically deducted automatically from transaction amounts or wallet balances. Fees must be available upfront for transactions to proceed. Fee amounts are non-negotiable and determined by network or protocol rules. Once paid, fees are irreversible and cannot be recovered.


8.10 Fee Disputes

8.10.1 No Refunds

Fees are strictly non-refundable regardless of circumstances. This includes situations involving user errors, changed minds after transaction initiation, failed strategies that don't generate expected returns, adverse market movements after transactions, or technical issues that prevent expected outcomes.

8.10.2 Dispute Limitations

We have no ability to reverse fee payments once made. Network fees paid to validators cannot be refunded by anyone. We cannot negotiate third-party fees on your behalf. We will not compensate for losses due to high fees. No credits or adjustments are available for fees paid.


8.11 Cost-Benefit Analysis

IMPORTANT CONSIDERATIONS FOR EVALUATING COSTS:

Users should carefully evaluate whether expected benefits exceed total costs before engaging with the Protocol. Consider whether fees are proportionate to transaction amounts, as percentage costs may be prohibitive for small transactions. Research alternative options that might offer lower fees for similar outcomes. Calculate the total cost of participation including all fees and opportunity costs. Evaluate risk-adjusted returns after accounting for all fees and costs.

Small transactions may be entirely uneconomical due to fixed network fees that don't scale with transaction size.


8.12 Fee Transparency Commitment

We commit to providing clear disclosure of any fees under our control. We will give advance notice before implementing new fees. Our fee structures will be transparent and clearly documented. We will not impose hidden charges within our control. However, we cannot control network fee volatility that may change moment to moment, third-party fee modifications that occur without our knowledge, market-driven costs that fluctuate with conditions, or emergency fee situations arising from network congestion.


8.13 Additional Cost Warnings

WARNING: The following cost considerations are critical to understand:

Total costs may exceed the benefits you receive from Protocol participation. Network fees can spike unexpectedly to levels many times higher than normal. Multiple transactions multiply fees, potentially making complex operations very expensive. Failed transactions still consume gas fees with no benefit to you. When all costs are considered, total expenses may be substantial relative to transaction values.


8.14 Acknowledgment of Fee Understanding

By using the Services, you acknowledge that you fully understand all applicable fees and their potential variability. You accept the volatile nature of blockchain network fees. You take complete responsibility for all costs incurred through your use. You have conducted a thorough cost-benefit analysis before participating. You bear all risks associated with fee volatility and unexpected costs.


9. RISK DISCLOSURES


⚠️ CRITICAL RISK WARNING

BY USING THE SERVICES, YOU ACKNOWLEDGE AND ACCEPT SUBSTANTIAL RISKS INCLUDING THE POTENTIAL FOR TOTAL LOSS OF ALL ASSETS. YOU MUST READ AND UNDERSTAND THIS ENTIRE SECTION CAREFULLY BEFORE PROCEEDING.


9.1 Smart Contract Risks

9.1.1 Code Vulnerabilities

Smart contracts may contain critical vulnerabilities that could result in total loss of funds. Undiscovered bugs may exist in the code that enable malicious actors to drain funds or manipulate the Protocol. Logic errors in the smart contract design could cause unintended outcomes that result in losses. Security vulnerabilities might allow unauthorized access to funds or administrative functions. Design flaws could create systemic risks that affect all users of the Protocol. Integration issues between different smart contracts may create unexpected attack vectors.

Even contracts that have undergone multiple professional audits can still contain critical, undiscovered vulnerabilities that may be exploited.

9.1.2 Immutability Risks

The immutable nature of smart contracts presents unique and severe risks. Once deployed, bugs in smart contracts cannot be fixed or patched, meaning any vulnerability remains exploitable forever. Errors in the code logic are permanent and will affect all future interactions with the contract. Upgrade mechanisms, if they exist, introduce their own risks and may not cover all issues. Mistakes in initial deployment cannot be reversed and may render contracts unusable. Vulnerabilities discovered after deployment persist indefinitely, potentially allowing ongoing exploitation.

9.1.3 Complexity Risks

The Protocol involves complex interactions between multiple smart contracts, external protocols, and blockchain infrastructure. These complex systems may behave in unexpected ways under certain conditions or combinations of inputs. The interactions can fail in unforeseen ways that weren't anticipated during development or testing. Complexity creates emergent risks that only become apparent under specific circumstances. Full testing of all possible states and interactions is practically impossible. Edge cases and unusual scenarios may trigger catastrophic failures.

The multiplication of components and interactions exponentially increases potential failure points.


9.2 External Protocol Dependencies

9.2.1 Third-Party Protocol Risks

The Protocol relies on external protocols that operate independently and carry their own risks. These integrated protocols may suffer exploits that drain user funds across all connected systems. They may experience technical failures that halt operations or prevent withdrawals. External protocols may change their terms, fees, or functionality in ways that adversely affect the Protocol. Insolvency or failure of an external protocol could result in total loss of deposited assets. Compromised external protocols could enable attackers to steal funds through the integration points.

We do not control these external protocols and cannot guarantee their security, reliability, or continued operation.

9.2.2 Cascading Failures

Problems in one integrated protocol can trigger cascading failures across multiple systems. A security breach in one protocol may provide attackers with access to others. Contagion effects can spread losses from one protocol to all connected systems. Liquidity crises in external protocols can freeze assets across the ecosystem. Systemic breakdowns may occur when multiple protocols interact in unexpected ways. Total losses can result from failures in protocols you don't directly interact with.

9.2.3 Strategy Risks

Yield generation strategies carry inherent risks that may result in losses rather than gains. Strategies may underperform expectations or generate negative returns. Previously profitable strategies may become unprofitable due to market changes. Strategies may become unavailable if external protocols modify their offerings. Competition from other users may reduce strategy effectiveness. Market conditions may change in ways that make strategies consistently lose money.

Past performance of any strategy never guarantees or indicates future results.


9.3 Total Loss Scenarios

9.3.1 Complete Loss Possibilities

YOU MAY LOSE 100% OF YOUR DEPOSITED ASSETS WITH NO POSSIBILITY OF RECOVERY.

Total loss can occur through numerous vectors including smart contract hacks that drain all funds, external protocol failures that lose all integrated assets, compromise of your private keys allowing theft of everything, market crashes that reduce asset values to zero, technical failures that make funds permanently inaccessible, regulatory actions that freeze or confiscate assets, and operational errors that send funds to irrecoverable addresses.

9.3.2 No Recovery Mechanisms

In the event of total loss, no recovery mechanisms exist to restore your funds. There is no insurance coverage for losses of any kind. No compensation fund exists to reimburse users for losses. Blockchain transactions cannot be reversed or rolled back. No guarantees or protections exist regardless of the cause of loss. Legal recourse may be limited or entirely unavailable. The decentralized nature of the Protocol means no central authority can restore losses.

9.3.3 Acceptance of Loss Risk

By using the Services, you explicitly accept the risk of total, permanent loss of all assets. You agree that you will not hold us responsible for any losses regardless of cause. You understand that recovery of lost funds is impossible in most scenarios. You acknowledge that you have been clearly warned of these risks. You assume full personal and financial responsibility for all losses.

YOU SHOULD ONLY USE FUNDS THAT YOU CAN AFFORD TO LOSE ENTIRELY WITHOUT AFFECTING YOUR FINANCIAL WELLBEING.


9.4 Market and Economic Risks

9.4.1 Volatility Risks

Cryptocurrency markets exhibit extreme volatility that can result in sudden, severe losses. Asset values can crash by 50% or more within hours or even minutes. Market conditions change rapidly and unpredictably based on countless factors. Liquidity can evaporate instantly, preventing you from exiting positions. Historical correlations between assets can break down without warning. Black swan events occur regularly in cryptocurrency markets, causing massive dislocations.

9.4.2 Liquidity Risks

You may be unable to withdraw your assets when desired due to various liquidity constraints. The Protocol may have insufficient liquidity to process withdrawals during stress periods. Market freezes can prevent any transactions from executing. Network congestion may make transactions prohibitively expensive or impossible. Smart contract limitations may impose withdrawal restrictions or delays. External protocol constraints can lock funds indefinitely.

Liquidity is never guaranteed, and you may be unable to access your funds when you need them most.

9.4.3 Economic Attack Risks

The Protocol may be subject to various economic attacks that could result in losses. Economic exploits may drain value from the Protocol through manipulation. Governance attacks could redirect funds or change Protocol parameters adversely. Market manipulation might cause artificial price movements that trigger losses. Flash loan attacks can exploit Protocol mechanics in single transactions. MEV (Maximal Extractable Value) exploitation can extract value from user transactions.


9.5 Technical Infrastructure Risks

9.5.1 Blockchain Network Risks

The underlying blockchain networks carry fundamental risks that affect all applications built on them. Network congestion can prevent transactions from being processed for extended periods. Blockchain forks may split the network, creating confusion and potential losses. 51% attacks could reorganize transaction history and reverse transfers. Consensus mechanism failures might halt block production entirely. Protocol changes at the blockchain level may break compatibility with smart contracts.

9.5.2 Oracle Risks

Price feeds and data oracles are critical dependencies that introduce significant risks. Oracles may provide incorrect data that triggers inappropriate Protocol actions. Malicious actors may manipulate oracle feeds to exploit the Protocol. Oracle downtime can halt Protocol operations that depend on external data. Compromised oracles might feed deliberately false information. Lag in oracle updates may cause the Protocol to act on outdated information.

Oracle failures or manipulations can trigger liquidations, losses, or other adverse outcomes.

9.5.3 Interface Risks

The web interface and applications used to interact with the Protocol have their own risks. Interfaces may display incorrect information leading to user errors. Frontend bugs could cause transactions to fail or execute incorrectly. DNS hijacking might redirect users to malicious sites that steal funds. Hosting failures could make the interface inaccessible when needed. Censorship or blocking might prevent access to the interface in certain jurisdictions.


9.6 Regulatory and Legal Risks

9.6.1 Regulatory Uncertainty

The regulatory landscape for blockchain protocols and cryptocurrencies remains highly uncertain. Regulations are undefined and continuously evolving in most jurisdictions. Different jurisdictions have conflicting or incompatible regulatory approaches. Regulatory changes may occur suddenly and have retroactive effects. Activities that are legal today may be banned tomorrow. New compliance requirements may be impossible to meet while maintaining Protocol functionality.

9.6.2 Enforcement Risks

You may face enforcement actions from regulatory authorities including asset freezes that prevent access to your funds, legal actions seeking penalties or restitution, tax liabilities including penalties and interest, criminal prosecution for violations of financial laws, and regulatory penalties that could be financially devastating.

9.6.3 Compliance Risks

Your activities may violate laws or regulations without your knowledge or intent. Local laws may prohibit participation in the Protocol. Reporting requirements may apply that you're unaware of. Tax obligations may be created that you don't understand. International participation may breach multiple jurisdictions' regulations. Sanctions restrictions may apply to your transactions.

You bear complete responsibility for understanding and complying with all applicable laws.


9.7 Operational Risks

9.7.1 Human Error

Losses frequently result from user mistakes that cannot be reversed. Sending funds to incorrect addresses results in permanent loss. Entering wrong amounts can transfer more than intended. Misunderstanding Protocol functions may lead to unexpected outcomes. Accidental transactions cannot be canceled once broadcast. Configuration mistakes in vault deployment create permanent vulnerabilities.

9.7.2 Phishing and Scams

Malicious actors continuously attempt to steal funds through deception. Fake websites that appear identical to legitimate ones steal credentials and funds. Impersonation scams convince users to send funds or reveal private keys. Social engineering attacks manipulate users through false urgency or authority. Malicious contracts masquerade as legitimate Protocol functions. Fraudulent projects may receive allocated funds and disappear.

9.7.3 Access Risks

You may permanently lose access to your assets through various means. Lost private keys mean permanent inability to access funds. Forgotten passwords for encrypted wallets cannot be recovered. Device failures may destroy the only copy of access credentials. Service discontinuation might make interfaces unavailable. Geographic restrictions could block access from your location.


9.8 Governance and Social Risks

9.8.1 Governance Decisions

Protocol governance mechanisms may produce adverse outcomes for users. Governance decisions might benefit certain parties at the expense of others. Important user interests may be ignored in governance processes. Governance conflicts could paralyze Protocol development. Capture by hostile actors could redirect the Protocol against user interests. Failure to adapt to changing conditions might render the Protocol obsolete.

9.8.2 Community Risks

Community dynamics introduce social risks to Protocol participation. Coordination failures may prevent effective collective action. Conflicting interests between user groups may create deadlocks. Manipulation attempts might skew allocation decisions. Social attacks could undermine trust in the Protocol. Community breakdown might destroy the Protocol's value proposition.


9.9 Novel and Experimental Technology

9.9.1 Unproven Systems

The Protocol employs experimental mechanisms that have not been thoroughly tested in all conditions. Novel approaches may have unexpected failure modes. Untested integrations between systems may behave unpredictably. Emerging technology carries risks that are not yet understood. Complex interactions may produce outcomes that weren't anticipated in design.

New systems have unknown failure modes that may only become apparent during extreme conditions or after extended operation.

9.9.2 Limited History

The Protocol's limited operating history means many risks remain undiscovered. Long-term risks have not had time to manifest. Edge cases and unusual scenarios haven't been encountered. Stress testing under extreme conditions is incomplete. Failure patterns are not well understood. Risk models are theoretical and may not reflect reality.


9.10 Specific Protocol Risks

9.10.1 Donation Mechanism Risks

The Protocol's donation model introduces unique risks distinct from traditional DeFi protocols. Yield allocation is irreversible, meaning you cannot reclaim donated yields. You should have no expectation of returns from your participation. The Protocol depends on recipients properly using allocated funds. Allocation mechanisms are complex and may not function as expected. Distribution of funds may fail or be delayed indefinitely.

9.10.2 Multi-Party Risks

The involvement of multiple participant types creates coordination and execution risks. Different parties may have conflicting incentives that undermine Protocol operation. Trust requirements between parties may be violated. Communication gaps may lead to misunderstandings and errors. Complex multi-party interactions increase failure points.


9.11 Force Majeure Risks

Unforeseeable events entirely outside anyone's control may affect the Protocol. Natural disasters may destroy critical infrastructure. Wars or terrorism could disrupt internet connectivity. Pandemic effects might prevent necessary human interventions. Global internet disruptions could make the Protocol inaccessible. Power grid failures might prevent transaction processing. Future technologies like quantum computing could break current cryptographic security.

No party can control or prevent force majeure events, and their impacts may be catastrophic.


9.12 Risk Acknowledgments and Acceptance

By using the Services, you expressly acknowledge and accept all of the following without reservation: the risk of total permanent loss of all your assets, the absence of any guarantees or insurance coverage, your use of experimental and unproven technology, your assumption of full personal responsibility for all outcomes, that you have been thoroughly warned of all risks described above, your voluntary assumption of all these risks, that you will make no claims against us for any losses, and that you have conducted your own independent risk assessment.


9.13 Risk Mitigation Limitations

While certain measures may partially mitigate some risks, including security audits of smart contracts, extensive testing procedures, following best security practices, potentially available insurance products, and diversification strategies, you must understand that no mitigation eliminates risks entirely. Audits may miss critical vulnerabilities. Testing cannot cover all scenarios. Best practices may be insufficient. Insurance may not cover your specific losses. Diversification may not protect against systemic failures.

NO COMBINATION OF RISK MITIGATION MEASURES CAN ELIMINATE THE POSSIBILITY OF TOTAL LOSS.


9.14 Evolution of Risks

The risks associated with the Protocol are dynamic and constantly evolving. New risks emerge without warning as the ecosystem develops. Existing risks change over time as conditions evolve. Multiple risks may compound with each other creating greater dangers. The risks described here may be exceeded by unforeseen dangers. Many risks are impossible to predict before they manifest.

This risk disclosure, no matter how comprehensive, cannot possibly cover all potential risks you may face.


10. ELIGIBILITY AND RESTRICTIONS


10.1 Age and Legal Capacity Requirements

10.1.1 Minimum Age

YOU MUST BE AT LEAST 18 YEARS OLD OR THE AGE OF MAJORITY IN YOUR JURISDICTION, WHICHEVER IS GREATER.

By using the Services, you represent and warrant that you meet the minimum age requirement for your jurisdiction. You must have reached legal majority as defined by the laws where you reside. You must possess the legal capacity to form binding contracts under applicable law. You cannot be restricted by guardianship, conservatorship, or other legal limitations on your capacity. You must have full legal authority to accept these Terms and use the Services.

10.1.2 No Minors

The Services are strictly prohibited for use by minors. Parents or guardians may not consent to these Terms on behalf of minors. Minors may not use the Services even with parental permission or supervision. We do not knowingly collect information from or provide services to minors. Any use of the Services by minors constitutes a material breach of these Terms.

If we discover that a minor has accessed the Services, we will terminate such access immediately and may report the incident to appropriate authorities.

10.1.3 Capacity Verification

We reserve the right to implement verification procedures to confirm user eligibility. We may request age verification through various means at any time. Identity confirmation may be required to establish legal capacity. We may implement additional verification procedures as we deem necessary. Failure to pass verification or provide requested information will result in immediate access termination.


10.2 Geographic Restrictions

10.2.1 Prohibited Jurisdictions

THE SERVICES ARE NOT AVAILABLE IN ALL JURISDICTIONS AND ARE STRICTLY PROHIBITED IN CERTAIN TERRITORIES.

Access to the Services is completely prohibited from sanctioned countries and regions subject to comprehensive embargoes. Jurisdictions where cryptocurrency activities are illegal cannot access the Services. Locations with specific regulatory restrictions that prohibit our Services are excluded. Areas subject to United Nations, United States, European Union, or other sanctions are restricted.

10.2.2 User Location Responsibility

You bear complete responsibility for determining whether your access to the Services is legally permitted. You must check and understand your local laws regarding cryptocurrency and blockchain services. You must verify the regulatory status of the Services in your jurisdiction. You must confirm your jurisdiction's eligibility before accessing the Services. You must monitor regulatory changes that might affect your eligibility. You must comply with all restrictions that apply to your location.

The fact that you can technically access the Services from your location does not mean such access is legal or permitted.

10.2.3 Restriction Implementation

We implement geographic restrictions through various technical and procedural means. IP address blocking may prevent access from restricted jurisdictions. Geographic detection systems identify and restrict users from prohibited locations. Wallet address screening may identify addresses associated with restricted territories. Identity verification procedures may be required to confirm location eligibility. Access controls may be implemented or modified at any time without prior notice.

Geographic restrictions may be applied immediately without warning if required by law or our policies.


10.3 Entity Representations

10.3.1 Organizational Authority

If you are accessing the Services on behalf of an entity, you make additional representations. You must have actual authority to bind the entity to these Terms. The entity must be validly formed and in good standing in its jurisdiction. Use of the Services must be authorized by the entity's governing documents. All necessary corporate or organizational approvals must be obtained before use. You accept personal liability for any unauthorized use on behalf of the entity.

10.3.2 Entity Compliance

Entities using the Services must ensure comprehensive compliance with applicable requirements. The entity must comply with all laws in its formation jurisdiction. Operational restrictions in the entity's governing documents must be observed. All regulatory requirements applicable to the entity's type and activities must be satisfied. Proper authorization procedures must be followed for all Protocol interactions. The entity must have valid business purposes for using the Services.

10.3.3 Special Entity Types

Additional restrictions and requirements may apply to certain categories of entities. Regulated financial institutions may face additional compliance obligations. Government entities may be prohibited or restricted from participation. Non-profit organizations must ensure compliance with their tax-exempt purposes. Investment funds must comply with restrictions on their permitted investments. Trustees must ensure the Services are appropriate for their beneficiaries.


10.4 Jurisdiction-Specific Compliance

10.4.1 Local Law Compliance

You must ensure complete compliance with all applicable laws in every relevant jurisdiction. This includes the laws of your residence jurisdiction where you primarily live. Your access location's laws apply even if different from your residence. Your citizenship country's laws may apply regardless of your location. Any jurisdiction with a relevant connection to your activities may impose obligations.

We do not and cannot provide legal advice about any jurisdiction's requirements.

10.4.2 Regulatory Requirements

Depending on your jurisdiction, various regulatory requirements may apply to your use of the Services. You may need licenses or registrations to engage in certain activities. Regulatory approvals might be required before participating. Tax registrations may be necessary for proper reporting. Ongoing reporting obligations may apply to your activities. Certain activities may be restricted or prohibited entirely.

10.4.3 Cross-Border Considerations

International participation in the Protocol raises complex multi-jurisdictional issues. Multiple jurisdictions' laws may apply simultaneously to your activities. Different jurisdictions may have conflicting or incompatible requirements. Tax treaties may affect your obligations but must be properly analyzed. International sanctions regimes may restrict your activities. Currency control laws may limit your ability to participate.

You must navigate the complexity of multi-jurisdictional compliance entirely on your own.


10.5 VPN and Circumvention Prohibition

10.5.1 Prohibition on Circumvention

YOU ARE STRICTLY PROHIBITED FROM USING ANY MEANS TO CIRCUMVENT GEOGRAPHIC OR OTHER RESTRICTIONS.

The use of VPN services to mask your true location is forbidden. Proxy servers must not be used to evade restrictions. TOR networks or similar anonymizing services are prohibited for circumvention. IP spoofing or any form of location masking violates these Terms. Any technique designed to evade our restrictions is strictly prohibited.

10.5.2 Detection and Consequences

If we detect any attempt to circumvent restrictions, severe consequences will follow immediately. Your access will be terminated instantly without any opportunity to cure the violation. Your accounts and associated addresses may be permanently banned from all Services. We may pursue legal action against you for violation of these Terms. Relevant authorities may be notified of your circumvention attempts. We accept no liability for any losses you incur due to termination for circumvention.

10.5.3 Legitimate VPN Use

If you use VPN services for legitimate privacy or security purposes unrelated to circumvention, you must still comply with all restrictions. Your actual physical location determines your eligibility regardless of VPN use. Circumventing geographic restrictions remains prohibited even with legitimate VPN use. We may require additional verification to confirm your actual location. False statements about your location constitute a material breach of these Terms.


10.6 Sanctions and Restricted Persons

10.6.1 Sanctions Compliance

You represent and warrant that you are not subject to any sanctions or restrictions. You are not listed on any government sanctions list. You are not owned or controlled by any sanctioned persons or entities. You are not acting on behalf of or for the benefit of sanctioned parties. You are not located in comprehensively sanctioned countries or regions. You are not subject to any blocking regulations or asset freezes.

10.6.2 Specific Sanctions Programs

Restricted persons include those designated under various sanctions programs. The U.S. Treasury's Office of Foreign Assets Control (OFAC) maintains several sanctions lists. The United Nations Security Council imposes sanctions through member state implementation. The European Union maintains consolidated lists of sanctioned persons and entities. Her Majesty's Treasury in the United Kingdom enforces UK-specific sanctions. Other governmental authorities worldwide maintain their own sanctions regimes.

10.6.3 Ongoing Monitoring

We conduct ongoing monitoring for sanctions compliance throughout your use of the Services. Users are screened against sanctions lists on an ongoing basis. Sanctions lists are monitored for updates that might affect user eligibility. Restrictions are updated immediately when sanctions designations change. Suspicious activity is reported to relevant authorities as required by law. We cooperate fully with law enforcement and regulatory authorities on sanctions matters.


10.7 Prohibited Persons and Activities

10.7.1 Excluded Persons

Certain categories of persons are completely prohibited from using the Services. Individuals convicted of money laundering or terrorist financing cannot access the Services. Persons known to be involved in financial crimes are excluded. Individuals under investigation for serious financial crimes may be restricted. Users who have been previously banned for violations cannot return under new accounts. Bad actors identified by the community or through our monitoring are prohibited.

10.7.2 High-Risk Categories

Enhanced restrictions and monitoring may apply to users in high-risk categories. Politically exposed persons (PEPs) may face additional scrutiny and requirements. Residents of high-risk jurisdictions may be subject to enhanced due diligence. Users with unusual activity patterns may trigger additional reviews. Large value transactions may require additional verification. Suspicious behavior may result in immediate suspension pending investigation.


10.8 Eligibility Changes

10.8.1 Dynamic Restrictions

Eligibility requirements are subject to change at any time based on various factors. New regulations may impose additional restrictions without warning. Sanctions updates occur regularly and take immediate effect. Our risk assessments may identify new categories of restricted users. Operational decisions may require changes to eligibility criteria. Legal requirements may mandate immediate implementation of new restrictions.

10.8.2 Ongoing Obligation

You have a continuous obligation to maintain eligibility throughout your use of the Services. You must monitor your continued eligibility on an ongoing basis. If you become ineligible for any reason, you must cease using the Services immediately. You must notify us of any changes that affect your eligibility status. You must comply with new restrictions as they are implemented. You must accept termination of access if you no longer meet eligibility requirements.


10.9 Verification Requirements

10.9.1 Potential Verification

We may require various forms of verification at any time during your use of the Services. Identity verification through government-issued documents may be required. Proof of address through utility bills or official documents may be necessary. Documentation regarding the source of your funds may be requested. Attestations regarding your eligibility and compliance may be required. Ongoing monitoring may necessitate periodic re-verification.

10.9.2 Verification Failure

Failure to complete required verification procedures will result in immediate consequences. Access to the Services will be denied or terminated. Available features may be limited until verification is complete. Your account may be suspended pending successful verification. In certain circumstances, funds may be frozen as required by law. Failure to verify may be reported to relevant authorities.


10.10 False Information

10.10.1 Prohibition on Misrepresentation

You are strictly prohibited from providing any false or misleading information. All information you provide must be completely true and accurate. You may not misrepresent your eligibility or qualifications to use the Services. The use of false identities or credentials is forbidden. Submission of forged or altered documents constitutes fraud. Any misleading statements or omissions of material facts are prohibited.

10.10.2 Consequences

Providing false information will result in severe consequences including immediate and permanent termination of access, potential legal prosecution for fraud or related crimes, civil liability for any damages caused, criminal charges where applicable under law, and lifetime bans from all Services.


10.11 No Discrimination

While we maintain necessary legal restrictions, we apply them fairly and uniformly. We do not discriminate based on illegal or improper factors. Restrictions are applied uniformly to all users in similar circumstances. Our restrictions are based solely on legal requirements and legitimate risk factors. We provide equal access to all users who meet eligibility requirements. However, legal compliance necessitates restrictions that may disproportionately affect certain groups.


10.12 Eligibility Representations

By using the Services, you make the following affirmative representations and warranties: you meet all eligibility requirements without exception, you are not a restricted or prohibited person under any applicable standard, you are not located in or accessing from a prohibited jurisdiction, you will not attempt to circumvent any restrictions through any means, all information you have provided is accurate and complete, you will maintain ongoing compliance with all requirements, you accept any verification requirements we impose, and you understand that your access may be terminated at any time if you fail to maintain eligibility.


10.13 Indemnification for Violations

If you violate any eligibility requirements, you agree to comprehensive indemnification obligations. You will indemnify us for all losses arising from your violations. You will cover all legal costs and penalties we incur. You will compensate us for any damages to our business or reputation. You will hold us completely harmless from all consequences. You accept full financial and legal liability for your violations.


10.14 No Right to Access

ACCESS TO THE SERVICES IS A PRIVILEGE THAT MAY BE REVOKED AT ANY TIME, NOT A RIGHT.

We reserve absolute discretion to control access to the Services. We may deny access to anyone for any reason or no reason. We may terminate access at any time without notice. We may impose additional requirements beyond those stated here. We may modify eligibility criteria without advance notice. Our determinations regarding eligibility are final and not subject to appeal.


11. REPRESENTATIONS AND WARRANTIES


11.1 General User Representations

By accessing or using the Services, you make the following representations and warranties to us:

11.1.1 Legal and Regulatory Compliance

You represent and warrant that you will comply with all applicable laws, regulations, rules, and legal requirements in any relevant jurisdiction. Your use of the Services is not and will not be prohibited by any legal or regulatory authority with jurisdiction over you. You have independently determined the legal status of your activities and confirmed their legality. You will not use the Services for any unlawful purpose or in furtherance of any illegal activity. You accept complete responsibility for ensuring legal compliance in all aspects of your use.

11.1.2 Authority and Capacity

You possess full legal capacity to enter into these Terms as a binding agreement. You have all necessary rights, power, and authority to use the Services as you intend. You are authorized to perform all actions you undertake through the Services. You have the legal ability to form binding contracts under applicable law. You are not subject to any restrictions, disabilities, or limitations that would prevent your use of the Services or acceptance of these Terms.

11.1.3 Accurate Information

All information you provide to us or through the Services is true, accurate, current, and complete in all respects. You will promptly update any information that changes or becomes inaccurate. You have not misrepresented any material facts or omitted important information. Your submissions, profiles, and communications do not violate any laws or third-party rights. You will maintain the accuracy of all information throughout your use of the Services.

11.1.4 Understanding and Acceptance

You understand the experimental and novel nature of blockchain technology and smart contracts. You comprehend all risks disclosed in these Terms and have evaluated them carefully. You possess sufficient knowledge and experience to evaluate the risks of using the Services. You are not relying on us for investment, financial, legal, tax, or other professional advice. You accept full responsibility for your decisions and their consequences.

11.1.5 Technical Competence

You possess sufficient technical understanding to safely use the Services. You can properly manage private keys and understand the implications of their loss. You understand how smart contract interactions work and their irreversible nature. You can evaluate transaction parameters and understand their effects. You will carefully verify all transaction details before confirmation.


11.2 Financial and Asset Representations

You make the following representations and warranties regarding your financial situation and assets:

11.2.1 Source of Assets

All assets you use with the Services are legally obtained through legitimate means. No assets derive from criminal activities or illegal sources. You have valid and clear title to all assets you use. Your funds are not subject to forfeiture, seizure, or confiscation. You comply with all anti-money laundering laws and regulations applicable to you.

11.2.2 Financial Sophistication

You have the ability to evaluate and understand financial risks. You understand that the Protocol is designed for donations, not investment returns. You can afford the potential total loss of all assets used with the Services. You have conducted your own risk assessment and due diligence. You are not relying on or expecting any financial returns from your participation.

11.2.3 No Encumbrances

Your assets are free and clear of all liens, encumbrances, and third-party claims. You have the unrestricted right to transfer and use your assets as you intend. No third party has any claim, interest, or right in the assets you use. Your use of the Services does not violate any agreements you have with others. Your participation doesn't breach any obligations you owe to third parties.


11.3 Compliance Representations

11.3.1 Sanctions and Restrictions

You represent that you are not subject to any economic sanctions or trade restrictions. You are not listed on any government sanctions or prohibited persons list. You are not owned, controlled, or acting on behalf of sanctioned parties. You will not interact with or facilitate transactions for prohibited persons. You will maintain ongoing compliance with all sanctions requirements.

11.3.2 Tax Compliance

You will comply with all tax obligations arising from your use of the Services. You understand the tax implications of your activities. You will properly report all taxable events to relevant authorities. You accept sole responsibility for determining and paying your taxes. You will not use the Services to evade taxes or avoid reporting obligations.

11.3.3 Regulatory Compliance

You will obtain any licenses or registrations required for your activities. You comply with all financial regulations applicable to your use. You understand and will fulfill any reporting requirements. You will not violate securities laws or regulations. You accept all regulatory risks associated with your participation.


11.4 Role-Specific Representations

11.4.1 Vault Deployer Representations

If you deploy or manage vaults, you additionally represent that you have the authority and expertise to configure vaults properly. You understand the implications and risks of your deployment decisions. You will comply with all applicable regulations regarding donation and charitable giving. You accept complete responsibility for your configuration settings. You have legitimate, lawful purposes for your vault deployment.

11.4.2 Participant Representations

If you participate in allocation mechanisms, you represent that you meet all eligibility requirements for participation. You will not attempt to manipulate or game the voting or allocation systems. You understand and accept the rules governing participation. You accept that outcomes are determined by collective decisions and mathematical formulas. You will not engage in sybil attacks or other forms of manipulation.

11.4.3 Recipient Representations

If you receive allocations from the Protocol, you represent that you are a legitimate entity or project with valid purposes. You will use any received funds solely for the purposes represented. You have all necessary authorizations to receive donations. You will comply with all requirements attached to funding. You have the legal capacity to receive donations in your jurisdiction.


11.5 Ongoing Warranties

Your representations and warranties have continuing effect throughout your use of the Services.

11.5.1 Continuous Nature

All representations and warranties are deemed repeated each time you access or use the Services. They continue in effect throughout the entire period of your use. They are reaffirmed with each transaction you initiate or complete. They must be updated if circumstances change. They survive termination where relevant to matters arising during use.

11.5.2 Change Notification

You warrant that you will immediately notify us if any representation becomes untrue. You will cease using the Services if any warranty is breached. You will promptly update any information that becomes inaccurate. You will disclose any material changes in your circumstances. You accept all consequences of changes in your status or situation.


11.6 Third-Party Rights

You represent and warrant regarding third-party rights and interests:

11.6.1 No Violations

You will not violate any third-party rights through your use of the Services. Your use does not and will not infringe any intellectual property rights. You have obtained all necessary permissions from relevant third parties. You will not misappropriate confidential or proprietary information. You respect and will not violate the rights of other users.

11.6.2 Content and Submissions

You own or have all necessary rights to any content you submit. Your content does not violate any third-party rights or applicable laws. You grant us all necessary licenses to use your content as described in these Terms. You will not submit harmful, malicious, or inappropriate content. You accept full responsibility for all content you provide.


11.7 Security Representations

You represent that:

11.7.1 Security Practices

You will maintain adequate security for your accounts and wallets. You will protect your private keys with appropriate safeguards. You will not share your credentials with any other person. You will follow security best practices for blockchain interactions. You understand and accept the security risks involved.

11.7.2 No Malicious Activity

You will not introduce malware, viruses, or harmful code. You will not attempt unauthorized access to any systems. You will not interfere with or disrupt Protocol operations. You will not attempt to compromise security measures. You will responsibly report any security issues you discover.


11.8 Breach Consequences

11.8.1 Immediate Consequences

If any representation or warranty proves false or is breached, immediate consequences follow. Your access to the Services may be terminated instantly. Pending transactions may be blocked or canceled where possible. Available features may be restricted or removed. Your accounts may be suspended or permanently banned. Relevant authorities may be notified of the breach.

11.8.2 Legal Consequences

Breach of your representations and warranties may result in severe legal consequences. You may face civil liability for all damages caused by your breach. Criminal prosecution may follow where your breach constitutes a crime. Regulatory actions and penalties may be imposed. You may be permanently banned from all Services. You will be responsible for all legal costs and expenses.

11.8.3 Financial Consequences

You may be held financially liable for all losses we suffer due to your breach. This includes our legal fees and costs for addressing the breach. You must pay any regulatory penalties imposed on us due to your actions. You are liable for all third-party claims against us arising from your breach. Consequential and indirect damages may also be your responsibility.


11.9 Reliance

11.9.1 Our Reliance

We are expressly relying on your representations and warranties in providing you access to the Services, enabling various features and functionalities, making the Services available to you, ensuring our own legal compliance, and managing risks associated with the Services.

11.9.2 Material Nature

Your representations and warranties are material terms of our agreement. They constitute a fundamental inducement for our providing the Services. They are essential conditions to your use of the Services. They form the foundation of our relationship. They are the basis for our assuming obligations under these Terms.


11.10 No Waiver of Representations

11.10.1 Survival

Your representations and warranties survive any termination of these Terms. They continue after you cease using the Services. They remain enforceable for all matters arising during your use. Our failure to enforce them immediately does not constitute a waiver. They may be enforced at any time.

11.10.2 Independent Obligations

Each representation and warranty stands independent of the others. Each is separately enforceable without reference to others. The invalidity of one does not affect the others. Each is fully binding on its own terms. If one is severed, the others remain in full force.


11.11 Representation Acknowledgments

BY USING THE SERVICES, YOU ACKNOWLEDGE THE CRITICAL IMPORTANCE OF YOUR REPRESENTATIONS:

False representations may result in immediate termination, legal prosecution, unlimited financial liability, permanent bans from all Services, and potential asset freezing where legally required.

You affirm that all your representations and warranties are true and accurate. You accept all consequences for any false statements or breaches. You will maintain the truthfulness of all representations. You understand their material importance to our agreement. You agree to indemnify us for any breach of your representations.


11.12 Disclaimer of Our Representations

WE MAKE NO REPRESENTATIONS OR WARRANTIES OF ANY KIND except those expressly stated in these Terms. All Services are provided on an "AS IS" and "AS AVAILABLE" basis without any warranties, whether express, implied, or statutory.


11.13 Representation Updates

We may require periodic reconfirmation of your representations. Additional representations may be required as regulations change. Updated certifications may be necessary for continued use. New warranties may be added based on evolving requirements. Expanded attestations may be needed for certain features.

Failure to provide required updates or reconfirmations will result in termination of access.


11.14 Representation Disputes

If any of your representations are disputed or questioned, we may investigate the matter thoroughly. We may request supporting documentation to verify your representations. We may suspend your access during any investigation. We make the final determination on all representation matters. You bear the burden of proving the truth of your representations.


11.15 Indemnification for False Representations

You agree to fully indemnify, defend, and hold us harmless from any and all claims, losses, damages, or expenses arising from your false representations, breached warranties, inaccurate information you provided, material omissions or disclosures, or changed circumstances you failed to report.

This indemnification obligation survives termination indefinitely and is unlimited in amount.


12. TAX RESPONSIBILITIES


12.1 Your Sole Tax Responsibility

YOU ARE SOLELY AND EXCLUSIVELY RESPONSIBLE FOR ALL TAX OBLIGATIONS arising from or related to your use of the Services.

Your tax responsibilities include determining what taxes apply to your activities, calculating the correct amount of taxes owed, reporting taxable events to appropriate authorities, and paying all required taxes timely. These obligations may include income taxes on yields or rewards, capital gains taxes on asset appreciation, donation-related taxes whether as donor or recipient, gift taxes on certain transfers, value-added taxes (VAT) where applicable, goods and services taxes (GST) in relevant jurisdictions, withholding taxes on cross-border transactions, and any other taxes that may apply to your specific situation.

We do not and will not provide tax advice, prepare tax documents, or handle tax reporting on your behalf.


12.2 Potential Tax Events

Tax obligations may arise from numerous interactions with the Protocol. Depositing assets into vaults may trigger taxable events in some jurisdictions. Withdrawing assets could result in recognition of gains or losses. Receiving yield or rewards typically constitutes taxable income when received. Staking or unstaking tokens may have immediate tax consequences. Participating in governance or voting might create tax obligations. Receiving donations often creates tax liabilities or reporting requirements. Making donations may provide deductions but only under specific conditions. Token swaps or conversions generally trigger taxable events. Each type of Protocol interaction may have different tax implications depending on your jurisdiction and circumstances.

Every transaction you make may have unique tax consequences that you must determine and handle appropriately.


12.3 Jurisdiction-Specific Obligations

Tax treatment varies dramatically across different jurisdictions, and you must understand your specific obligations. You must determine your tax residency, which may differ from your physical location. You need to understand how local tax laws apply to cryptocurrency and DeFi activities. Compliance with all reporting requirements in your jurisdiction is mandatory. You must meet all filing deadlines or face penalties. Payment of required tax amounts must be made timely to avoid interest and penalties.

Tax laws are extremely complex, change frequently, and vary significantly by jurisdiction. You must consult qualified tax professionals familiar with cryptocurrency taxation in your jurisdiction.


12.4 Record Keeping

You are entirely responsible for maintaining comprehensive records for tax purposes. This includes keeping complete records of all transactions with dates, amounts, and counterparties. You must document your cost basis for all assets accurately. Tracking holding periods is essential for determining applicable tax rates. Recording fair market values at the time of each transaction is critical. Preserving all supporting documentation for tax positions is necessary.

Blockchain records alone are typically insufficient for tax compliance, and you must maintain your own comprehensive records.


12.5 Cross-Border Considerations

International participation in the Protocol creates complex multi-jurisdictional tax obligations. You may owe taxes in multiple jurisdictions simultaneously. Foreign reporting requirements such as FBAR or FATCA may apply. Tax treaties between countries might affect your obligations but require careful analysis. Withholding obligations may apply to cross-border transactions. Currency conversion rules may affect tax calculations.


12.6 Information Reporting

We may be legally required to report certain information to tax authorities. This could include providing transaction data when requested by tax authorities, complying with court orders for tax-related information, responding to regulatory inquiries about user activities, and maintaining records as required by law.

We will comply with all lawful information requests from tax authorities, which may include information about your activities.


12.7 No Tax Optimization

We do not structure the Protocol or transactions for tax efficiency. We provide no tax planning services or advice. The Protocol does not offer tax optimization features. We cannot provide guidance on tax implications. We make no determinations about the tax treatment of any activities.


12.8 Donation Considerations

Special considerations apply to the donation aspects of the Protocol:

Donations through the Protocol may or may not be tax-deductible depending on numerous factors. The tax status of the recipient significantly affects deductibility. Documentation requirements for claiming deductions vary by jurisdiction. Limits on deductible amounts may apply. International donations have special rules and may not be deductible. The structure of the donation through smart contracts may affect tax treatment.

You must consult qualified tax advisors to understand the tax treatment of any donation activities.


12.9 Tax Indemnification

You agree to fully indemnify us for any tax-related liabilities imposed on us due to your activities, including taxes, penalties, interest charges, professional fees for addressing tax issues, and any other costs arising from your tax matters.


12.10 Key Tax Acknowledgments

By using the Services, you explicitly acknowledge that you bear all tax liability for your activities, tax laws are complex and vary significantly by jurisdiction, professional tax advice is strongly recommended for all users, we provide no tax services or assistance whatsoever, and compliance with tax obligations is entirely your responsibility.

FAILURE TO PROPERLY COMPLY WITH TAX OBLIGATIONS MAY RESULT IN SEVERE CIVIL PENALTIES, CRIMINAL PROSECUTION, ASSET SEIZURE, AND IMPRISONMENT.


13. AML, KYC AND SANCTIONS COMPLIANCE


13.1 Anti-Money Laundering (AML) Policy

The Services may not be used for money laundering, terrorist financing, or any other illicit financial activities under any circumstances.

Prohibited activities include laundering proceeds of any criminal activity through the Protocol, disguising or obscuring illicit fund sources, structuring transactions to avoid reporting thresholds, facilitating financial crimes of any nature, providing financial support to terrorist organizations, and evading financial regulations through use of the Services.

We reserve the right to monitor transactions, report suspicious activities to authorities, and take immediate action to prevent illicit use of the Services.


13.2 Sanctions Compliance

13.2.1 Prohibited Persons

You represent and warrant that you are not listed on any government sanctions list, owned or controlled by sanctioned parties, acting on behalf of restricted persons, located in comprehensively sanctioned territories, or subject to any blocking regulations or asset freezes.

13.2.2 Applicable Sanctions Programs

We comply with sanctions programs administered by the U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC), the United Nations Security Council, the European Union, Her Majesty's Treasury of the United Kingdom, and other relevant governmental authorities worldwide.

13.2.3 Restricted Territories

Access is completely prohibited from comprehensively sanctioned countries and regions. This includes but is not limited to Cuba, Iran, North Korea, Syria, the Crimea, Donetsk, and Luhansk regions of Ukraine, and any other territories subject to comprehensive sanctions.

The complete current list of restricted territories is maintained in Appendix B and is subject to change without notice.


13.3 Know Your Customer (KYC) Requirements

We may require identity verification at any time, including government-issued identification documents, proof of current address, documentation regarding source of funds, beneficial ownership information for entities, and enhanced due diligence for high-risk users or transactions.

Failure to complete KYC procedures when requested will result in immediate termination of access and possible reporting to authorities.


13.4 Transaction Monitoring

We employ various methods to monitor compliance including screening wallet addresses against sanctions databases, monitoring transaction patterns for suspicious activity, flagging unusual behaviors or volumes, analyzing activity through behavioral indicators, and utilizing blockchain analytics tools to track fund flows.

Unusual or suspicious activity may trigger enhanced review, account restrictions, or reporting to authorities.


13.5 Source of Funds

You warrant that all assets you use with the Services are legally obtained from legitimate sources, have documented and verifiable origins, are not proceeds of criminal activity, can be proven legitimate if required, and are free from claims by law enforcement or regulatory bodies.

We may request documented proof of legitimate fund sources at any time.


13.6 Reporting Obligations

We will comply with all legal requirements to file Suspicious Activity Reports (SARs) when required, report to Financial Intelligence Units as mandated, respond to law enforcement requests for information, provide data to regulators as legally required, and maintain records as required by applicable laws.

Legal restrictions prevent us from notifying you if reports about your activities are filed with authorities (tipping-off prohibition).


13.7 Compliance Cooperation

You agree to provide any requested compliance information promptly, submit all required documentation within specified timeframes, cooperate fully with any compliance investigations, update your information whenever changes occur, and accept all verification procedures we implement.

Non-cooperation with compliance procedures will result in immediate termination and potential reporting to authorities.


13.8 Screening and Restrictions

We implement comprehensive screening and restriction measures including screening users against global sanctions lists, blocking wallet addresses associated with illicit activity, freezing suspicious assets where legally required, denying access to high-risk users, and implementing enhanced controls for certain user categories.

Screening occurs continuously and restrictions may be applied at any time without prior notice.


13.9 No Circumvention

You are strictly prohibited from using VPNs or other means to evade compliance restrictions, accessing Services through third parties to avoid detection, creating multiple accounts to circumvent screening, obscuring the true source of transactions, or assisting others in avoiding compliance measures.

Attempts to circumvent compliance measures will be reported to law enforcement and may result in criminal prosecution.


13.10 Compliance Updates

Compliance requirements evolve constantly due to new regulations being enacted, sanctions lists being updated regularly, risk assessments identifying new threats, regulatory guidance changing requirements, and enforcement actions setting new precedents.

You must maintain ongoing compliance with all current requirements as they change.


13.11 Risk-Based Approach

We apply enhanced compliance measures based on various risk factors including transaction volumes and patterns, geographic risk factors, user behavior indicators, specific risk indicators we identify, and regulatory requirements for certain activities.


13.12 Third-Party Services

We utilize various third-party services to maintain compliance including identity verification providers, sanctions screening databases, transaction monitoring systems, risk assessment tools, and other compliance technologies.

Adverse findings from third-party compliance services may affect your ability to access the Services.


13.13 No Criminal Purpose

The Services must never be used for money laundering in any form, financing of terrorism, evading sanctions or embargoes, tax evasion or fraud, any type of fraud or financial crime, or any other criminal activity whatsoever.

Any criminal use will be immediately reported to appropriate law enforcement agencies.


13.14 Compliance Acknowledgments

By using the Services, you acknowledge that strict compliance with all requirements is absolutely mandatory, violations will have severe legal consequences, continuous screening and monitoring occur, full cooperation with compliance procedures is required, and your access depends entirely on maintaining compliance.


13.15 Indemnification

You will fully indemnify us for all losses arising from your compliance failures, including any false certifications you provide, sanctions violations we incur due to your actions, criminal activity you engage in, and regulatory penalties imposed on us because of your activities.

This indemnification includes all fines, penalties, legal costs, and any other expenses we incur.


14. PROHIBITED ACTIVITIES


14.1 Overview

You may not use the Services for any unlawful purpose or in any manner inconsistent with these Terms. The following sections detail specific prohibited activities, but this list is not exhaustive. Any activity that violates applicable laws, regulations, or these Terms is strictly forbidden and will result in immediate termination of access and potential legal action.


14.2 Illegal and Criminal Activities

You may not use the Services to engage in or facilitate any criminal activity. This includes money laundering or terrorist financing in any form, facilitating drug trafficking or trade in illegal substances, committing fraud, theft, embezzlement, or any financial crime, evading taxes or financial regulations, violating sanctions or export controls, engaging in human trafficking or exploitation, operating or facilitating any criminal enterprise, or violating any applicable laws or regulations.


14.3 System Manipulation and Exploits

Technical manipulation of the Services or Protocol is strictly prohibited. You may not exploit bugs, vulnerabilities, or unintended features for gain, attempt unauthorized access to any systems or data, reverse engineer any part of the Services except as legally permitted, circumvent or disable security measures, conduct denial-of-service attacks or similar disruptions, use automated bots or scripts without explicit permission, scrape data without authorization, or interfere with the normal operation of systems.


14.4 Market Manipulation

Market manipulative practices that harm other users or market integrity are forbidden. Prohibited activities include wash trading to create artificial volume, front-running other users' transactions, conducting MEV exploitation attacks that harm users, manipulating prices through coordinated action, generating artificial trading volume, organizing or participating in pump schemes, spreading false information to affect markets, or creating fake activity to mislead others.


14.5 Fraud and Misrepresentation

All forms of fraud and deceptive practices are strictly prohibited. You may not engage in identity theft or impersonation of any person, provide false or misleading information, create fake accounts or sybil identities, misrepresent your affiliations or authority, forge or falsify any documents, make false claims about the Protocol or Services, deceive or defraud other users, or conduct phishing or social engineering attacks.


14.6 Governance and Voting Manipulation

The integrity of governance and voting mechanisms must be maintained. You may not create sybil accounts to gain unfair voting power, buy or sell voting power outside approved mechanisms, coordinate voting attacks against the Protocol, manipulate quadratic or other voting mechanisms, game allocation systems for unfair advantage, bribe or coerce other participants, or take any action that undermines governance integrity.


14.7 Harassment and Harmful Behavior

Respectful interaction with all participants is required. Prohibited conduct includes harassment, bullying, or intimidation of others, making threats of any kind, stalking or doxxing individuals, engaging in hate speech or discrimination, defamation or false statements about others, violating others' privacy rights, posting harmful or offensive content, or organizing coordinated harassment campaigns.


14.8 Intellectual Property Violations

Respect for intellectual property rights is mandatory. You may not infringe copyrights, trademarks, or patents, misuse our brand, logos, or trademarks, copy protected content without authorization, violate trade secrets or confidential information, remove proprietary notices or attributions, use intellectual property without proper authorization, or submit materials that infringe third-party rights.


14.9 Commercial Exploitation

Unless expressly authorized in writing, you may not resell or commercialize access to the Services, charge fees for helping others access Services, create derivative or competing services using our infrastructure, use Services for unauthorized business purposes, sublicense your access to others, or operate competing services that rely on our systems.


14.10 Privacy and Data Violations

Privacy and data protection must be respected. Prohibited activities include collecting personal information without proper consent, violating privacy laws or regulations, conducting unauthorized data mining or harvesting, selling or trafficking in user information, breaching confidentiality obligations, installing tracking or monitoring without permission, or violating GDPR, CCPA, or similar privacy regulations.


14.11 Spam and Unwanted Content

The Services must not be used to distribute unwanted content. You may not send unsolicited communications or spam, post repeated advertisements, flood systems with excessive content, create content farms or similar schemes, distribute chain letters or pyramid schemes, or post irrelevant materials repeatedly.


14.12 Circumvention Activities

Attempting to bypass restrictions or limitations is prohibited. This includes using VPNs or proxies to evade geographic restrictions, creating multiple accounts to avoid limits or bans, bypassing sanctions or compliance screening, evading suspension or termination, helping others circumvent any restrictions, or using false identities to gain unauthorized access.


14.13 Harmful Technical Activities

Technical attacks against the Services or users are strictly forbidden. You may not introduce malware, viruses, or harmful code, deploy smart contract exploits or attacks, conduct network attacks of any kind, attempt to compromise user wallets, inject malicious code into any system, create security vulnerabilities, or disrupt Service availability for others.


14.14 Unauthorized Financial Activities

Operating unauthorized financial services is prohibited. This includes operating without required licenses or registrations, offering unregistered securities, running pyramid or Ponzi schemes, facilitating unauthorized gambling, processing payments illegally, or conducting any financial activity without proper authorization.


14.15 Minor Protection

Protection of minors is paramount. You may not target or exploit minors in any way, collect information from individuals under 18, market inappropriate content to minors, enable minor access to Services, or violate any child protection laws.


14.16 Acknowledgment

By using the Services, you acknowledge that all described activities are strictly forbidden, violations will have serious and permanent consequences, continuous monitoring and enforcement occur, zero tolerance exists for serious violations, and you accept full responsibility for your actions.

ENGAGING IN PROHIBITED ACTIVITIES WILL RESULT IN IMMEDIATE TERMINATION, MAY LEAD TO LEGAL ACTION, AND COULD RESULT IN CRIMINAL PROSECUTION.


15.Intellectual Property

15.1 Ownership of Services

15.1.1 Our Intellectual Property

We and our licensors own all rights, title, and interest in the Services and Interfaces, including all website content and design, trademarks and logos, documentation and guides, software (excluding open-source components), databases and compilations, and all improvements and derivatives thereof. All rights not expressly granted to you in these Terms are reserved by us.

15.1.2 Protected Elements

Our intellectual property includes the "Octant" name and branding, our logo and visual identity, all interface designs, content we create, marketing materials, proprietary code, and trade secrets. These elements are protected by copyright, trademark, trade secret, and other intellectual property laws.


15.2 Limited License to Use Services

15.2.1 License Grant

We grant you a limited, non-exclusive, non-transferable, revocable license to access and use the Services, view our content, interact with the Protocol, and use the Services as permitted by these Terms. This license is personal to you and may not be assigned or transferred to any other party.

15.2.2 License Restrictions

You may not modify or create derivative works based on the Services, copy or reproduce any portion of the Services, distribute or transfer the Services to third parties, sublicense or sell access to the Services, remove any proprietary notices or labels, use the Services for any unauthorized purposes, or exceed the scope of the license granted herein. Any attempt to do so is a violation of our rights and may subject you to legal action.


15.3 User Content

15.3.1 Your Content Ownership

You retain ownership of any content you submit to or through the Services, but you grant us a license to use such content as described below.

15.3.2 License to Us

By submitting content to the Services, you grant us a worldwide, non-exclusive, royalty-free, sublicensable, transferable, perpetual, and irrevocable license to use, reproduce, modify, display, distribute, and create derivative works of your content for the purposes of operating and improving the Services. This license continues even after you stop using the Services.

15.3.3 User Content Representations

You represent and warrant that your content is original or that you have all necessary rights and licenses to submit it, that it does not infringe any third-party intellectual property rights or other rights, that it complies with all applicable laws and regulations, that it contains no harmful or malicious elements, and that it may be used by us as contemplated by the license you grant.


15.4 Trademark Usage

15.4.1 No Trademark License

These Terms do not grant you any rights to use our trademarks, service marks, logos, or brand features except for accurate references to our Services as permitted by fair use under trademark law or with our express written permission. Any use of our trademarks must be in accordance with applicable law and our brand guidelines if published.

15.4.2 Trademark Restrictions

You may not use our marks in your own product or service names, in any way that suggests our endorsement or affiliation with you, modify or alter our marks in any way, use marks that are confusingly similar to ours, register our marks or any variations as your own trademarks, or use our marks in any false or misleading manner. Violation of these trademark restrictions may result in legal action.


15.5 Open Source Protocol

15.5.1 Protocol Licensing

The underlying Protocol smart contracts are open source software developed and licensed by the Golem Foundation under the terms specified in the applicable GitHub repository. The open source license grants permissions to use, modify, and distribute the Protocol code subject to the specific conditions set forth in that license. You must comply with all applicable open source license terms when interacting with the Protocol code.

15.5.2 Distinction from Interface

The open source license applies only to the Protocol smart contracts themselves and does not extend to our proprietary interfaces, the Octant brand and trademarks, our website and services, documentation we create, or our modifications or additions to the Protocol. These elements remain our exclusive property and are not licensed under open source terms. Please review the applicable GitHub repository for complete license terms and attribution requirements.


15.6 Feedback and Suggestions

15.6.1 Feedback Ownership

Any feedback, suggestions, ideas, or other information you provide to us regarding the Services becomes our exclusive property upon submission. We may use such feedback without any obligation to compensate you, without any attribution requirement, without any confidentiality obligation, without accounting to you for such use, and without any other restrictions or obligations to you.

15.6.2 No Obligation

We have no obligation to use any feedback you provide, respond to your suggestions, implement your ideas, acknowledge your contributions, or maintain the confidentiality of any feedback you submit. You should not submit any feedback that you wish to keep confidential or for which you expect compensation.


15.7 Third-Party Intellectual Property

15.7.1 Third-Party Rights

The Services may contain or integrate third-party open-source software, licensed content, integrated services, external protocols, and user submissions. We do not claim ownership of such third-party intellectual property, and your use of such elements is subject to their respective licenses and terms.

15.7.2 Your Responsibility

You must respect all third-party intellectual property rights and comply with all applicable licenses. You must not infringe any third-party intellectual property rights through your use of the Services. You are responsible for handling any intellectual property claims independently and must indemnify us for any violations of third-party intellectual property rights arising from your use of the Services.


15.8 Copyright Policy

15.8.1 Copyright Infringement

We respect intellectual property rights and will respond to valid notices of alleged copyright infringement in accordance with applicable law, including the Digital Millennium Copyright Act (DMCA).

15.8.2 DMCA Notice

To report copyright infringement, you must provide a written notice containing identification of the copyrighted work claimed to be infringed, identification of the allegedly infringing material with sufficient detail to locate it, your contact information including name, address, telephone number, and email address, a statement that you have a good faith belief that the use is not authorized, a declaration that the information in your notice is accurate and that you are the copyright owner or authorized to act on their behalf, and your physical or electronic signature.

15.8.3 Counter-Notice

If you believe your content was wrongly removed due to a mistake or misidentification, you may submit a counter-notice containing identification of the removed material and its location before removal, a statement under penalty of perjury that you have a good faith belief the material was removed by mistake, your consent to jurisdiction in your district court and acceptance of service from the complaining party, your contact information, and your physical or electronic signature.


15.9 License Survival

Upon termination of these Terms, your license to use the Services ends immediately, but our license to your content continues as necessary for our legitimate business purposes. Intellectual property ownership remains unchanged by termination, all prohibitions regarding intellectual property continue to apply, and prior authorized uses of intellectual property remain valid.


15.10 No IP Warranty

We do not warrant that the Services are free from intellectual property infringement claims, that any intellectual property protections are valid or enforceable, that intellectual property defenses will be available or successful, that intellectual property information provided is accurate or complete, or that you will be free from third-party intellectual property claims.


15.11 IP Indemnification

You agree to indemnify, defend, and hold us harmless from any claims arising from your content, your violations of intellectual property rights, third-party claims against us based on your use of the Services, your use of our trademarks, and any breaches of the licenses granted in this section.


15.12 Key IP Acknowledgments

By using the Services, you acknowledge our ownership of our intellectual property, accept the limitations of the license granted to you, grant us the rights to use your content as described, agree to respect third-party intellectual property rights, and agree to indemnify us for any intellectual property claims.

Intellectual property violations may result in immediate termination of your access to the Services, legal action for damages and injunctive relief, claims for monetary damages, court orders preventing further violations, and in severe cases, criminal prosecution under applicable law.


16. PRIVACY AND DATA

16.1 Privacy Policy

Your use of the Services is subject to our Privacy Policy, which is incorporated into these Terms by reference and forms an integral part of your agreement with us. The Privacy Policy describes in detail how we collect, use, share, and protect your information when you use our Services.

The Privacy Policy is available at: [Privacy Policy URL to be inserted]


16.2 Consent to Data Practices

By using the Services, you expressly consent to the collection, use, and disclosure of your information as described in the Privacy Policy. You understand that we may collect certain information automatically when you use the Services and that you have choices about some of our data practices as described in the Privacy Policy.


16.3 Blockchain Data

You acknowledge and understand that blockchain transactions are inherently public and permanent. Any information you submit to a blockchain through the Services becomes part of the permanent public record and cannot be deleted, modified, or made private after the fact. You should carefully consider the permanent and public nature of blockchain data before submitting any transaction or information to the blockchain.


17. DISCLAIMERS


17.1 "AS IS" and "AS AVAILABLE" Provision

THE SERVICES ARE PROVIDED "AS IS" AND "AS AVAILABLE" WITHOUT WARRANTIES OF ANY KIND.

We provide the Services without making any promises or guarantees about their functionality or performance, availability or uptime, accuracy or completeness of information, suitability for your particular purposes, or security or safety. You accept the Services in their current state with all faults and defects.


17.2 No Warranties

WE EXPRESSLY DISCLAIM ALL WARRANTIES, WHETHER EXPRESS, IMPLIED, OR STATUTORY.

This means the Services may not be of merchantable quality and may contain defects or errors. The Services may not be fit for your particular purpose or meet your specific needs or expectations. The Services may violate third-party intellectual property or other rights. We may not have clear ownership of all components of the Services. Your use of the Services may be disrupted or interrupted at any time. Information provided through the Services may be incorrect, incomplete, or outdated. The Services may fail, malfunction, or cease operating entirely without notice.


17.3 No Investment or Financial Advice

WE DO NOT PROVIDE INVESTMENT, FINANCIAL, TAX, LEGAL, OR OTHER PROFESSIONAL ADVICE.

All information provided through the Services is for general informational purposes only and should not be construed as professional advice. You should not rely on any information from the Services when making financial or investment decisions. You should always consult with qualified professionals for advice specific to your situation. We are not financial advisors, investment advisors, or fiduciaries, and we do not owe you any fiduciary duties.

THE PROTOCOL IS NOT AN INVESTMENT PRODUCT AND GENERATES NO RETURNS FOR DEPOSITORS. The Protocol is designed to facilitate yield donation, not investment returns.


17.4 No Fiduciary Relationship

NO FIDUCIARY RELATIONSHIP EXISTS BETWEEN US.

We do not act as your fiduciary or advisor, we do not owe you any special duties beyond those expressly stated in these Terms, we do not put your interests ahead of our own, we do not provide personalized advice or recommendations, and we do not accept any trust responsibilities toward you. All interactions between us are conducted at arm's length as independent parties.


17.5 No Guarantees of Operation

We do not guarantee continuous availability of the Services or that they will be available at any particular time. We do not guarantee error-free operation or that defects will be corrected. We cannot ensure uninterrupted access or that the Services will meet your requirements. The Services may not be compatible with all systems, devices, or browsers. We may modify or discontinue features at any time without notice. We make no guarantees about Protocol functionality or that smart contracts will operate as intended. We do not guarantee that any particular strategy will generate yield or perform as expected. The Services may fail completely and permanently at any time without warning.


17.6 Third-Party Services Disclaimer

WE DISCLAIM ALL LIABILITY FOR THIRD-PARTY SERVICES.

This includes external protocols such as Aave, Morpho, and other DeFi protocols, wallet providers and their software, blockchain networks and their operation, oracle services and data feeds, infrastructure providers and hosting services, and any integrated applications or services. Third-party failures, exploits, or issues may cause you to lose some or all of your assets, and we have no control over and accept no responsibility for such third-party services.


17.7 Information Accuracy Disclaimer

Information displayed through the Services may be incorrect, inaccurate, or based on faulty data. Data may be delayed or outdated by the time you view it. Information may be incomplete or missing important context. Displays may be misleading or confusing due to technical limitations. The Services may be subject to technical errors, bugs, or calculation mistakes. You should not rely on displayed information for critical decisions and should independently verify any important information.


17.8 No Endorsement

We do not endorse, recommend, or approve any projects or recipients that may use the Services, any third-party protocols integrated with the Services, any investment or yield strategies, any user decisions or actions, any external content or information, or any community opinions or statements. Any references to third parties or external resources do not imply our approval, recommendation, or endorsement.


17.9 Experimental Technology

THE SERVICES USE EXPERIMENTAL BLOCKCHAIN TECHNOLOGY.

This technology has not been fully tested in all conditions and may contain unknown flaws or vulnerabilities. The technology could fail catastrophically without warning, resulting in total loss of assets. The Services involve novel risks that have not been fully identified or understood. There are no established precedents for many aspects of the technology. You use the Services entirely at your own risk with full knowledge of their experimental nature.


17.10 No Professional Relationships

Your use of the Services does not create any professional relationship with us, including but not limited to attorney-client relationships, accountant-client relationships, financial advisor relationships, broker relationships, or agent relationships. We are not acting in any professional capacity when providing the Services.


17.11 Security Disclaimers

We do not guarantee protection from hacks, exploits, or other attacks on the Services or Protocol. We cannot prevent all security breaches or unauthorized access. We cannot ensure the security of your funds or assets. We cannot guarantee safety from malicious actors or contracts. We cannot ensure the protection of your data or personal information from all threats. Security breaches may result in the total loss of your assets with no possibility of recovery.


17.12 Regulatory Compliance

We do not guarantee that your use of the Services complies with laws in your jurisdiction. The Services may not have required regulatory approvals in your location. We make no representations about tax compliance or obligations. We cannot confirm the registration status or licensing of all aspects of the Services. You bear complete responsibility for ensuring your compliance with all applicable laws and regulations.


17.13 Performance Disclaimers

We make no representations about the amount or likelihood of yield generation, the returns from any strategy, the efficiency of the Protocol's operation, the speed of transactions, or the cost effectiveness of using the Services. Past performance of any strategy or protocol never indicates or guarantees future results.


17.14 Force Majeure

We are not liable for any failure or delay in performance caused by circumstances beyond our reasonable control, including but not limited to natural disasters, wars, terrorism, or civil unrest, pandemics or other health emergencies, government actions or regulations, infrastructure failures or internet outages, or any other events beyond our reasonable control.


17.15 Disclaimer of Damages

WE DISCLAIM LIABILITY FOR ALL CATEGORIES OF DAMAGES.

This includes direct damages, indirect damages, incidental damages, consequential damages, punitive or exemplary damages, special damages, lost profits or revenue, lost opportunities, loss of data, and business interruption. This disclaimer applies regardless of the legal theory under which damages might be claimed.


17.16 User Decision Disclaimer

We are not responsible for your investment decisions, allocation choices, level of participation, risk assessment, due diligence, or the outcomes of any of your actions. All decisions you make regarding the Services and their consequences are yours alone, and you bear full responsibility for them.


17.17 No Recourse Disclaimer

In case of losses, you acknowledge that no insurance covers your use of the Services, recovery of losses is not guaranteed and may be impossible, no compensation will be available from us, no refunds will be provided under any circumstances, and you have limited or no legal recourse for losses.


17.18 Jurisdiction-Specific Limitations

Some jurisdictions do not allow certain disclaimer limitations. Where legally prohibited, our disclaimers apply only to the maximum extent permitted by law. Statutory rights that cannot be waived may override some disclaimers. Consumer protection laws may provide certain minimum protections. Mandatory warranties may exist despite our disclaimers. However, nothing in these Terms expands our liability beyond the minimum required by applicable law.


17.19 Survival of Disclaimers

These disclaimers survive any termination of these Terms and your use of the Services. They apply to all past, present, and future use of the Services and cover all related claims whenever they arise. The disclaimers extend to our successors and assigns and remain fully enforceable indefinitely.


17.20 ACKNOWLEDGMENT

BY USING THE SERVICES, YOU ACKNOWLEDGE THAT NO WARRANTIES OF ANY KIND EXIST, TOTAL LOSS OF YOUR ASSETS IS POSSIBLE, WE ARE NOT YOUR ADVISORS OR FIDUCIARIES, THE TECHNOLOGY IS EXPERIMENTAL AND MAY FAIL, AND YOU ASSUME ALL RISKS OF USING THE SERVICES.

IF YOU REQUIRE WARRANTIES, GUARANTEES, OR PROFESSIONAL ADVICE, DO NOT USE THE SERVICES.

18. LIMITATION OF LIABILITY


18.1 Maximum Liability Cap

TO THE MAXIMUM EXTENT PERMITTED BY LAW, OUR TOTAL AGGREGATE LIABILITY FOR ALL CLAIMS ARISING FROM OR RELATED TO THESE TERMS OR THE SERVICES WILL NOT EXCEED ONE HUNDRED U.S. DOLLARS ($100).

This cap applies regardless of the number of claims you bring, the theory of liability under which you proceed, the type of damages you seek, the number of transactions you conduct, or the amount of your losses.


18.2 Excluded Damages

WE WILL NOT BE LIABLE FOR ANY INDIRECT, INCIDENTAL, CONSEQUENTIAL, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES. This means we are not responsible for secondary or derivative losses, collateral or associated harm, follow-on effects or results, unique or unusual losses, punishment or deterrent awards, or awards meant as examples to others.

THESE EXCLUSIONS APPLY EVEN IF WE KNEW OR SHOULD HAVE KNOWN OF THE POSSIBILITY OF SUCH DAMAGES.


18.3 Specific Loss Exclusions

WE ARE NOT LIABLE FOR ANY OF THE FOLLOWING CATEGORIES OF LOSSES:

We are not liable for any financial losses, including lost profits or revenue, lost business opportunities, lost expected savings, investment losses, yield or return losses, trading losses, or decreases in asset value.

We bear no responsibility for operational losses such as business interruption, system downtime, service unavailability, performance degradation, transaction failures, or network congestion.

We are not liable for data and technical losses, including data loss or corruption, loss of private keys, wallet compromises, transaction errors, technical malfunctions, or software bugs.

We have no liability for losses arising from third parties, including external protocol failures, wallet provider issues, blockchain network problems, oracle errors, integration failures, or strategy losses.


18.4 Liability Theory Limitations

These limitations apply regardless of the legal theory on which any claim is based, whether in contract, tort (including negligence), strict liability, warranty, misrepresentation, statutory claims, or any other legal or equitable theory. The limitations apply even if any remedy provided in these Terms fails of its essential purpose or otherwise proves ineffective.


18.5 Force Majeure Exclusion

We have no liability for any failure or delay in performance resulting from circumstances beyond our reasonable control. These include acts of God, natural disasters, wars or terrorism, pandemics, government actions, labor disputes, infrastructure failures, internet disruptions, power outages, or any other events beyond reasonable control of the affected party.


18.6 Third-Party Actions

We are not liable for losses caused by third-party actions, including hacks or exploits, theft or fraud, phishing attacks, social engineering, malicious contracts, user errors, unauthorized access, or criminal activities. This exclusion applies even if we could have potentially prevented such actions through different security measures or operational procedures.


18.7 Blockchain-Specific Exclusions

We have no liability for losses arising from the inherent characteristics and risks of blockchain technology. This includes smart contract vulnerabilities, protocol failures, network forks, consensus failures, gas price spikes, MEV (Maximum Extractable Value) attacks, bridge failures, or cross-chain compatibility issues.


18.8 User Action Exclusions

We are not liable for the consequences of your own actions and decisions. This includes your investment decisions, configuration choices, security practices, compliance failures, misunderstandings of how the Protocol works, negligence in managing your assets, or voluntary assumption of risks after being warned.


18.9 No Liability for Non-Performance

We are not liable if you experience inability to withdraw funds, failed transactions, unmet expectations about the Services, feature unavailability, service modifications we implement, or discontinued operations.


18.10 Allocation of Risk

THIS LIMITATION OF LIABILITY REFLECTS THE ALLOCATION OF RISK BETWEEN THE PARTIES. These limitations are reasonable because the Services are provided free or at low cost, you maintain complete control over your own assets, all risks are disclosed upfront in these Terms, the technology is experimental in nature, and you voluntarily assume these risks by choosing to use the Services.


18.11 Statutory Limitations

In jurisdictions that do not allow certain liability exclusions or limitations, our liability will be limited to the fullest extent permitted by applicable law. Some warranties may be implied by law and cannot be disclaimed. Consumer protection laws may provide additional rights that cannot be waived. Liability for death or personal injury caused by negligence may not be excluded in some jurisdictions. In all cases, our liability is limited to the minimum amount required by applicable law.


18.12 Multiple Party Limitations

If multiple parties could potentially be liable for a loss, our liability is limited to our proportionate share of fault. We are not liable for the actions or omissions of other parties. We explicitly reject any joint and several liability. Any contribution obligations are limited to the liability cap stated in Section 18.1.


18.13 Time Limitations

All claims must be brought within one year after the claim arises or the shortest period allowed by applicable law, whichever is shorter. Claims not brought within this period are permanently waived and barred. The discovery rule does not extend these deadlines, and the limitations period begins when the claim accrues, not when you discover it.


18.14 Survival and Severability

These limitations survive any termination of your use of the Services or these Terms. They apply retroactively to the fullest extent allowed by law. If any limitation is found invalid, it is severable from other terms and the remaining limitations remain in full force. These limitations remain enforceable independently of other provisions and cannot be waived except by our express written agreement.


18.15 Basis of Bargain

THESE LIMITATIONS ARE AN ESSENTIAL BASIS OF OUR AGREEMENT. Without these limitations, we would not provide the Services, as the costs would be prohibitive, the risks would be unmanageable, the Terms would need to be substantially different, and access would need to be much more restricted.


18.16 Fair Notice

You acknowledge that these limitations were conspicuous and clearly presented, you had full opportunity to review them before accepting, you could have rejected these Terms and not used the Services, you voluntarily accepted these limitations, and the limitations are reasonable given the nature of the Services.


18.17 No Personal Liability

No personal liability attaches to our officers, directors, employees, contractors, agents, affiliates, licensors, or service providers. All claims must be brought against the company entity only, not against individuals associated with the company.


18.18 Indemnified Parties

All limitations of liability extend to protect Octant Labs, our parent companies, subsidiaries, affiliates, service providers, licensors, partners, and all related parties to the same extent they protect us.


18.19 ACKNOWLEDGMENT

BY USING THE SERVICES, YOU ACKNOWLEDGE AND ACCEPT that our total liability is capped at $100 USD, we are not liable for consequential or similar damages, claims must be brought within one year, the risk allocation between us is fair and reasonable, and you voluntarily accept these limitations.


19. INDEMNIFICATION


19.1 Your Indemnification Obligation

YOU AGREE TO INDEMNIFY, DEFEND, AND HOLD HARMLESS Octant Labs and all Indemnified Parties from and against any and all claims, demands, actions, damages, losses, costs, and expenses (including reasonable attorneys' fees) arising from or relating to your use of the Services or breach of these Terms.


19.2 Scope of Indemnification

Your indemnification obligations cover a broad range of activities and circumstances.

You will indemnify us for any claims arising from your actions and use of the Services, including your use or misuse of the Services, violations of these Terms, illegal activities you conduct, your negligence or willful misconduct, and any breach of your agreements with us or third parties.

You are responsible for indemnifying us for issues related to content and submissions you provide. This includes any content you submit or post through the Services, false or misleading information you provide, intellectual property violations, privacy violations, and any harmful materials you introduce.

Your indemnification extends to all compliance failures, including violations of applicable laws, regulatory breaches, tax obligations you fail to meet, sanctions violations, and AML/KYC failures.

You must indemnify us for third-party claims that arise from your activities, including disputes with other users, claims by recipients of donations, issues with wallet providers arising from your use, matters related to your business operations conducted through the Services, and claims from your own downstream users.

Security breaches attributable to you require indemnification, including compromised accounts under your control, unauthorized access you enable, consequences of lost private keys, losses to phishing victims caused by your actions, and security failures in your systems.

Your Protocol interactions that cause losses require indemnification, including problematic smart contract interactions, failed transactions attributable to your errors, configuration errors you make, strategy selections that cause losses to others, and vault deployments that harm third parties.


19.3 Indemnified Parties

Your indemnification obligation extends to Octant Labs, Golem Foundation and all related parties. This includes our officers and directors, our employees and contractors, our agents and representatives, our affiliates and subsidiaries, our service providers, our licensors and partners, our successors and assigns, and all other related parties (collectively, the "Indemnified Parties").


19.4 Defense and Settlement

Your defense obligations require you to provide a complete defense at your expense, hire qualified legal counsel acceptable to us, actively defend against all claims, cooperate fully with our reasonable requests, and act in good faith throughout the process.

We retain the right to assume control of the defense at your expense if we choose, approve your selection of counsel, participate with our own counsel at our expense, reject settlements we deem unreasonable, and control the overall defense strategy.

You may not settle any claim without our prior written consent, admit liability on our behalf, agree to injunctions that affect us, make binding commitments for us, or compromise our rights in any way.


19.5 Types of Losses Covered

Your indemnification covers all types of losses we might incur. Direct costs include legal fees and costs, settlement amounts, judgment awards, court costs, and expert witness fees. Indirect costs encompass investigation expenses, administrative costs, regulatory proceedings, compliance costs, and remediation expenses. Consequential losses include reputational damage, business interruption, lost opportunities, diminished value, and future harm.


19.6 Specific Indemnification Scenarios

You specifically indemnify us for several categories of claims. False representations requiring indemnification include misrepresented eligibility, false KYC information, incorrect certifications, hidden beneficial ownership, and undisclosed restrictions.

Criminal activity indemnification covers money laundering, fraud or theft, sanctions evasion, tax evasion, and any other illegal acts.

Intellectual property indemnification includes copyright infringement, trademark violations, patent infringement, trade secret theft, and publicity rights violations.

Regulatory action indemnification encompasses government investigations, regulatory fines, compliance orders, license requirements, and reporting obligations.


19.7 Procedure for Claims

When a claim arises, we will promptly notify you of claims requiring indemnification, provide available information about the claim, forward relevant documents to you, identify important deadlines, and specify what we need for defense.

You must respond promptly to our notice, assume defense immediately upon request, provide regular updates on the matter's status, consult with us on strategy decisions, and maintain open communication throughout.

Both parties will share relevant information as needed, provide access to witnesses, preserve evidence, maintain appropriate confidentiality, and act in good faith toward resolution.


19.8 Failure to Indemnify

If you fail to fulfill your indemnification obligations, we may defend ourselves at your expense and you remain fully liable for all costs. We may seek immediate reimbursement of our expenses, and interest will accrue on any amounts you owe us. We may also terminate your access to the Services immediately.


19.9 No Limitation on Indemnification

Your indemnification obligations are unlimited in amount with no maximum cap. They include all attorneys' fees we incur, cover all categories of damages, and extend to all costs we bear. The liability cap in Section 18 does not apply to your indemnification obligations.


19.10 Survival

Your indemnification obligations survive any termination of these Terms or your use of the Services. They continue indefinitely for claims arising during your use, apply to past actions even after discovered, cover claims discovered after termination, and remain fully enforceable.


19.11 Insurance

We may require you to maintain adequate insurance coverage for indemnified risks, name us as an additional insured on your policies, provide certificates of insurance upon request, maintain minimum coverage limits we specify, and ensure coverage for all indemnified risks.


19.12 Multiple Indemnitors

If multiple parties have indemnification obligations for the same claim, each is jointly and severally liable to us. We may pursue any or all indemnitors for the full amount. There is no right of contribution between indemnitors. Payment by one indemnitor doesn't release others from their obligations, and we are entitled to full recovery of our losses.


19.13 Currency and Payment

Indemnification amounts are payable in U.S. dollars and due immediately upon our demand. Unpaid amounts accrue interest at the maximum legal rate. You are responsible for our collection costs if we must pursue payment. We may set off amounts you owe against any amounts we might owe you.


19.14 Equitable Relief

In addition to indemnification, we may seek injunctive relief to prevent ongoing harm, specific performance of your obligations, restraining orders against harmful conduct, other equitable remedies courts may grant, and emergency relief without prior notice when necessary.


19.15 Examples of Indemnifiable Events

Examples of events requiring your indemnification include regulatory investigations triggered by your activities, user disputes about your vault configurations, tax authority claims about donation structures you implement, intellectual property claims regarding content you submit, data breaches from your compromised account, and losses arising from false certifications you provide.


19.16 ACKNOWLEDGMENT

BY USING THE SERVICES, YOU ACKNOWLEDGE that you will defend and indemnify us as required, your indemnification obligation is unlimited in amount, this obligation survives termination of these Terms, you will cover all related costs and expenses, and you fully accept these obligations.


19.17 Express Agreement

YOU EXPRESSLY AGREE to indemnify all Indemnified Parties, defend against all covered claims, pay all resulting costs and damages, hold us completely harmless from covered claims, and accept unlimited liability for your actions that trigger indemnification.


20. DISPUTE RESOLUTION


20.1 Governing Law

These Terms and any disputes arising from or relating to them or the Services shall be governed by the laws of the Cayman Islands, without regard to conflict of law principles that might require application of another jurisdiction's laws.


20.2 Informal Resolution First

Before filing any formal legal proceeding, you agree to attempt to resolve disputes informally. You must send written notice to us describing the nature of your dispute and your desired resolution. You must then allow 60 days for good faith negotiations to resolve the matter. During this period, you agree to participate in telephonic or video conferences if we request them. Most disputes can be resolved without formal proceedings through this informal process.


20.3 Competent Courts

To the extent permissible by applicable law, the courts in Cayman Islands will have exclusive jurisdiction to settle any disputes.

20.4 Time Limit for Claims

All claims must be brought within one year after they arise or be forever barred. This limitations period is shorter than many statutes of limitations but is a key term of our agreement


20.5 Survival

This dispute resolution provision survives any termination of these Terms or your use of the Services.

21. TERMINATION


21.1 Termination by You

You may terminate your use of the Services at any time by ceasing all access to the Services, withdrawing any assets you have in the Protocol, and deleting any local application data you may have stored. No formal notice to us is required for you to terminate your use. However, termination does not affect any obligations you incurred before termination, which remain binding and enforceable.


21.2 Termination by Us

We may terminate or suspend your access to the Services immediately, without prior notice or liability, for any reason whatsoever, including without limitation the following circumstances:

We may terminate your access for violations of these Terms or applicable law, including breach of any provision of these Terms, violation of applicable laws or regulations, engagement in prohibited activities, making false representations to us, or violations of sanctions requirements.

We may also terminate access if you present risks or potential harm to us or others, including legal or regulatory risk to our operations, security threats to the Services or other users, reputational harm to our business, or operational risks that we deem unacceptable.

Additionally, we may terminate your access for other grounds including extended periods of inactivity, in our sole discretion for any reason, due to Service discontinuation, for business reasons, or for no stated reason at all.


21.3 Effects of Termination

Upon termination, several immediate effects occur. Your access to the Services ends immediately, and your license to use the Services is revoked. You must cease all use of the Services, and all features become unavailable to you. Any support we may have been providing discontinues immediately.

Regarding blockchain interactions after termination, you may still be able to interact directly with the Protocol through other means since smart contracts remain on the blockchain. Any existing positions you have remain unaffected by termination of Interface access. However, you must manage these positions independently without our Interface support.

We provide no refunds upon termination for any reason. There are no pro-rata returns of any fees or costs, no compensation for any losses you may incur, no reimbursement of any fees you have paid, and no credits or adjustments of any kind.


21.4 Survival of Terms

The following sections and obligations survive any termination of these Terms: Intellectual Property (Section 15), Disclaimers (Section 17), Limitation of Liability (Section 18), Indemnification (Section 19), Dispute Resolution (Section 20), any licenses you granted for User Content, any confidentiality obligations, your tax responsibilities, your compliance obligations, and any other provisions that by their nature should survive termination.


21.5 Pre-Termination Obligations

Before termination takes effect, you should complete all pending transactions, withdraw any assets you have deposited, save any necessary records for your files, cancel any authorizations you have granted, and revoke any token approvals you have given through the Protocol. We are not responsible for any assets left in the Protocol after your access is terminated.


21.6 Suspension Rights

We may suspend rather than terminate your access in order to investigate potential violations, comply with legal process or court orders, perform necessary maintenance, address emergency situations, or protect users from harm. Such suspension may occur without prior notice to you.


21.7 No Liability for Termination

We have no liability for any termination or suspension of your access, loss of access to the Services, loss of data associated with your use, inability to withdraw assets after termination, missed opportunities resulting from termination, or any other damages arising from termination. This applies even if termination causes you significant losses.


21.8 Automatic Termination

Your access automatically terminates if you become ineligible to use the Services, you violate eligibility requirements, you are added to sanctions lists, your jurisdiction becomes restricted, or any legal prohibition applies to your use.


21.9 Remedies

Termination does not limit our other remedies. Legal action remains available to us, your indemnification obligations continue, we may pursue damages against you, injunctive relief remains possible, and we may make criminal referrals to authorities where appropriate.


21.10 Reservation of Rights

We reserve the right to take any actions we deem necessary before termination, preserve evidence of violations, report matters to authorities, notify other services about your conduct where permitted, and publish reasons for termination where legally allowed.


21.11 Appeals

You have no right to appeal our termination decision. Our decisions regarding termination are final and binding. We have no obligation to provide reasons for termination. No reinstatement is guaranteed even if you remedy the cause of termination. We may refuse to provide future services to you indefinitely.


21.12 Data Handling

Upon termination, we may delete your data from our systems. However, blockchain data remains permanent and immutable. Our backups may persist temporarily according to our retention policies. Legal obligations may require us to retain certain data despite termination. We provide no data recovery services after termination.


21.13 Voluntary Cessation

If we voluntarily discontinue the Services, we will provide reasonable notice when feasible. However, we have no obligation to continue providing the Services. We have no liability for any discontinuation of Services. Users must make their own arrangements for managing any positions. The Protocol may continue to operate independently on the blockchain despite Service discontinuation.


21.14 ACKNOWLEDGMENTS

By using the Services, you acknowledge that we can terminate your access at any time for any reason, no refunds will be provided upon termination, key obligations survive termination and remain binding, termination decisions are final and non-appealable, and you must take necessary actions before termination occurs.


21.15 Continuing Effect

Even after termination, past transactions you conducted remain valid and cannot be reversed. Blockchain records persist permanently. Your legal obligations under these Terms continue. Claims may still arise from your past use. Enforcement of these Terms remains possible. TERMINATION DOES NOT ERASE YOUR HISTORY OR OBLIGATIONS.


22. DRAGON-SPECIFIC PROVISIONS


22.1 Dragon Responsibilities

As a Dragon deploying or managing vaults, you acknowledge and accept full responsibility for all vault configurations and parameters you establish. You bear all risks associated with the strategies you select and potential losses from the protocols you choose to integrate. All allocation decisions are solely yours, and you have no recourse against us for suboptimal outcomes from your decisions. You are responsible for ensuring compliance with all donation and charitable activity regulations in your jurisdiction.


22.2 No Guarantees

You acknowledge that we do not verify the legitimacy of recipients you choose, guarantee the performance of any strategies you select, ensure the success of your allocation mechanisms, validate the tax efficiency of your structures, or provide operational support for your vault management.


22.3 Dragon Indemnification

You specifically indemnify us for all claims arising from your vault configurations, strategy selections and any failures thereof, disputes with recipients of your allocated funds, your community participation settings and their outcomes, and all operational decisions you make as a Dragon.


22.4 Dragon Acknowledgments

By operating as a Dragon, you acknowledge that you have complete control over vault operations, you bear all risks from your configuration choices, recipients may misuse funds you allocate to them, strategies may lose value instead of generating yield, and you cannot reverse decisions once implemented.


23. REGEN-SPECIFIC PROVISIONS


23.1 Participation Understanding

As a Regen participating in allocation mechanisms, you acknowledge that this is not an investment and you should expect no investment returns as participation is not for profit. Lock-up periods may apply to any tokens you stake, preventing withdrawal for specified periods. Your voting power may be limited or diluted based on others' participation. Rewards are not guaranteed and may be zero regardless of your participation level. All outcomes are determined by collective decisions of the community, not individual preferences.


23.2 Compliance Requirements

You agree to comply with all sybil resistance measures we implement to prevent gaming of the system. You will not attempt to manipulate voting systems through any means. You accept that quadratic mechanism results determine outcomes regardless of your individual preferences. You will report any rewards you receive for tax purposes as required by your jurisdiction. You will maintain eligibility throughout your entire participation period.


23.3 Regen Acknowledgments

As a Regen, you acknowledge that this is not an investment product, any tokens you stake may be locked for extended periods, rewards may never materialize despite your participation, your individual influence is limited by design, and all tax obligations from any rewards are exclusively yours to manage.


24. RECIPIENT-SPECIFIC PROVISIONS


24.1 Recipient Obligations

As a recipient of donations through the Protocol, you represent and warrant that you have a legitimate purpose for receiving funds that aligns with stated goals. You have full legal authority to receive donations in your jurisdiction. You will use allocated funds properly and in accordance with any stated purposes. You will comply with all applicable laws regarding receipt and use of donations. All information you provide in applications and profiles is accurate and complete.


24.2 No Funding Guarantees

You acknowledge that funding is never guaranteed regardless of past allocations. Amounts you receive may vary significantly or be zero in any given round. Future funding rounds are not assured and may never occur. Eligibility requirements may change without notice. You must actively claim allocations within specified timeframes or forfeit them.


24.3 Tax and Reporting

Recipients are responsible for all tax obligations arising from received donations, any required regulatory reporting in their jurisdiction, maintaining proper records of all donations received, providing documentation if requested by authorities or donors, and ensuring compliance with any grant conditions that may apply.


24.4 Recipient Acknowledgments

As a recipient, you acknowledge that all funding is purely discretionary, you must actively claim any allocations made to you, significant tax implications may exist for received donations, misuse of funds may result in permanent blacklisting, and you have no contractual right to any funds.


24.5 Recipient Indemnification

You indemnify us for any claims arising from your misuse of donations, false information in your applications, tax or regulatory violations related to received funds, failure to deliver on stated commitments, and any third-party disputes about funding you receive.


25. MISCELLANEOUS


25.1 Entire Agreement

These Terms, together with any documents incorporated by reference including the Privacy Policy, constitute the entire agreement between you and Octant Labs regarding the Services. They supersede all prior agreements, understandings, and communications, whether written or oral, relating to their subject matter.


25.2 Severability

If any provision of these Terms is found to be invalid, illegal, or unenforceable by a court of competent jurisdiction, the remaining provisions will continue in full force and effect. The invalid provision will be modified to the minimum extent necessary to make it valid and enforceable. If such modification is impossible, the provision will be severed from these Terms. The Terms will otherwise remain unchanged and fully enforceable.


25.3 No Waiver

Our failure to enforce any provision of these Terms is not a waiver of that provision or any other provision. It does not waive our right to enforce the provision later or to enforce it strictly. It does not waive any claims or rights we may have. Any waiver must be in writing and signed by our authorized representative to be effective.


25.4 Assignment

You may not assign or transfer these Terms or any of your rights or obligations without our prior written consent. Any attempted assignment without consent is void and of no effect. We may freely assign these Terms to our affiliates, successors, acquirers, reorganization entities, or any third party without restriction or notice to you.


25.5 Notices

We may provide notices to you through email if you have provided an email address, interface notifications when you access the Services, website postings, blog announcements, or public statements. All legal notices to us must be sent to [email protected] with the subject line clearly stating "Legal Notice."


25.6 Relationship of Parties

Nothing in these Terms creates a partnership, joint venture, agency relationship, employment relationship, fiduciary relationship, or franchise between the parties. We are independent contractors, each acting on our own behalf.


25.7 No Third-Party Beneficiaries

These Terms are solely for the benefit of you and us. No third party has any rights to enforce these Terms, except that Indemnified Parties may enforce indemnification provisions, and our successors and assigns may enforce all provisions as expressly stated herein.

25.8 Force Majeure

Neither party is liable for any delay or failure in performance caused by circumstances beyond their reasonable control, including natural disasters, wars or terrorism, pandemics, government actions, internet or infrastructure failures, or other events beyond reasonable control.


25.9 Electronic Signatures

You agree that electronic signatures are valid and binding, clicking "I Agree" or similar buttons constitutes your signature, digital acceptance is legally enforceable, and no physical signature is required for these Terms to be binding.


25.10 Records and Proof

Our records of your use of the Services constitute prima facie evidence of your activities, transactions, acceptances, communications, and any other relevant facts. You agree that such electronic records are admissible in any proceeding.


25.11 Cumulative Remedies

All remedies available to us are cumulative and not exclusive. We may pursue any and all available remedies simultaneously, separately, in any order we choose, and without making an election of remedies.


Home/Legal