← Back to Trident

Terms of Service

1. Acceptable Use

You may only use Trident to scan websites and applications that you own or have explicit written permission to test. Scanning targets without authorization is prohibited and may violate computer fraud and abuse laws in your jurisdiction.

2. Service Description

Trident provides automated security scanning to help identify common web application vulnerabilities. The service is provided "as is" without warranties of any kind. Trident does not guarantee the detection of all vulnerabilities.

3. Rate Limits

Free scans: 1 scan per hour without an account. Registered users: 5 scans per day. Full vulnerability scanning requires domain verification to prevent abuse.

4. Domain Verification

To run full security scans, you must verify domain ownership via DNS TXT record or HTML meta tag. This protects site owners from unauthorized scanning.

5. Data Handling

Scan results are stored for 30 days and then automatically deleted. We do not share scan results with third parties. Discovered vulnerabilities are only visible to the account that initiated the scan.

6. Limitation of Liability

Trident is not responsible for any damages resulting from the use of this service, including but not limited to data loss, service disruption, or security incidents. Users are responsible for evaluating and acting on scan results.

7. Prohibited Activities

  • Scanning targets you do not own or have permission to test
  • Using the service for denial-of-service attacks
  • Attempting to circumvent rate limits
  • Exploiting discovered vulnerabilities on third-party systems
  • Automated bulk scanning without prior arrangement

8. Account Termination

We reserve the right to terminate accounts that violate these terms without notice.

9. Changes to Terms

We may update these terms at any time. Continued use of the service constitutes acceptance of the updated terms.

Last updated: March 2026