Terms of Service
Last Updated: December 5, 2025
Please read these Terms of Service closely before using the VeilCore OS software, CLI tools, or interacting with the underlying smart contracts. By accessing or using our open-source software, you agree to be bound by these terms.
1. Agreement to Terms
VeilCore OS is a decentralized protocol running on the Solana blockchain. It provides privacy infrastructure for autonomous AI agents. By running a node, deploying an agent, or holding the $VEIL token, you acknowledge that you have read, understood, and agreed to these terms.
2. Nature of the Protocol
VeilCore OS is non-custodial software.
No Custody: We do not have access to your private keys, your biometric data, or your funds. You are solely responsible for the security of your cryptographic secrets.
Immutable Code: The protocol operates via smart contracts that are immutable once deployed. The development team cannot reverse transactions or recover lost access to agent identities.
3. Prohibited Use
You agree not to use the VeilCore OS protocol for any illegal activity. While the protocol provides privacy, it is not intended to facilitate criminal behavior. Prohibited activities include:
Money laundering or terrorist financing.
Engaging in sanctioned economic activities.
Distributing malware or malicious autonomous agents designed to harm other network participants.
4. Assumption of Risk
You acknowledge that using blockchain technology and Zero-Knowledge proofs involves significant risks.
Technical Risk: Bugs in the ZK-circuit logic or the Solana runtime could result in the loss of funds.
Regulatory Risk: The regulatory status of privacy-preserving protocols is subject to change. It is your responsibility to ensure your use of VeilCore OS complies with local laws in your jurisdiction.
5. Limitation of Liability
The software is provided "AS IS" and "AS AVAILABLE" without warranty of any kind. To the maximum extent permitted by law, the VeilCore contributors and the Veil Foundation shall not be liable for any direct, indirect, or consequential damages arising from your use of the protocol.
Last updated