Legal

Terms of Use

Rules for using Swamp Fox Cyber Defense's free tools and website, including AI tool disclaimers, acceptable use, and limitations of liability.

Effective Date: March 20, 2025  ·  Last Updated: March 20, 2025  ·  Applies To: tools.swampfoxcyber.org and swampfoxcyber.org
Agreement AI Tool Disclaimer Acceptable Use Legal Limits Data Sources Liability Contact
01 — Agreement

Acceptance of Terms

By accessing or using the websites located at tools.swampfoxcyber.org or swampfoxcyber.org, you agree to be bound by these Terms of Use. If you do not agree, please discontinue use of the site immediately.

These terms are governed by the laws of the Commonwealth of Pennsylvania. Any disputes arising from use of this site shall be resolved in the courts of Franklin County, Pennsylvania.

Swamp Fox Cyber Defense reserves the right to modify these terms at any time. The "Last Updated" date at the top of this page reflects current terms. Continued use of the site after changes constitutes acceptance.

02 — AI Tool Disclaimer

AI-Generated Results Are Informational Only

Important — Read Before Using AI Tools

Our AI-powered tools — including the Business Email Compromise (BEC) Checker and the IoT Device Inventory & AI Action Plan — use Google Gemini to generate automated analysis and recommendations.

These results are informational and educational only. They are not a substitute for professional cybersecurity assessment, legal advice, or law enforcement reporting.

AI systems can and do make errors. An AI result indicating an email is "safe" does not guarantee it is not a threat. An AI result indicating an email is suspicious does not mean it is definitively malicious. Always apply human judgment.

By using any AI-powered tool on this site, you acknowledge and agree that:

⚠️
Results may be inaccurate. AI analysis is probabilistic. It is not a definitive determination of whether any email, device, or situation is safe or dangerous.
🚫
Do not take financial action based solely on AI output. If an AI result relates to a financial transaction, wire transfer, or payment change — always verify by phone using a number you already have on file before acting.
📞
Report actual threats to authorities. This tool does not replace reporting to the FBI Internet Crime Complaint Center (IC3.gov), local law enforcement, or the PA Attorney General's Office.
🔒
Do not submit sensitive data. Do not enter Social Security numbers, financial account numbers, passwords, or protected health information into any tool on this site.
03 — Acceptable Use

Permitted & Prohibited Use

Our tools are provided free of charge for legitimate security awareness and defensive purposes only, primarily to help small businesses in Franklin County, PA and the surrounding region protect themselves from cyber threats.

Permitted uses include:

Using the BEC Checker to evaluate suspicious emails you have received
Using the IoT Inventory tool to assess your own organization's devices
Referencing CVE and threat intelligence data for defensive security purposes
Sharing links to these tools with other small businesses for educational purposes

Prohibited uses include:

🚫
Automated scraping or bulk queries to our tools or the third-party APIs they rely on
🚫
Using this site to facilitate attacks against networks, systems, or individuals
🚫
Misrepresenting tool results to others as definitive security certifications or professional opinions
🚫
Attempting to reverse-engineer, copy, or redistribute the tools without written permission
04 — Federal Law Notice

Computer Fraud & Default Credential Notice

⚠ Federal Law Warning: Default credentials listed on this site are provided solely for security awareness — to help device owners identify and change factory default passwords on their own equipment.

Accessing any computer system, network device, camera, router, or other networked equipment using these or any other credentials without authorization from the device owner is a federal crime under:

18 U.S.C. § 1030 — Computer Fraud and Abuse Act (CFAA) 18 Pa. C.S. § 7611 — Pennsylvania Unauthorized Use of a Computer

Violations can result in significant criminal penalties including imprisonment and fines. The information on this site is published in the same spirit as CISA's own default credential advisories — to help defenders, not attackers. Misuse of this information is solely the responsibility of the individual who misuses it.

05 — Data Sources & Attribution

Third-Party Data & Source Accuracy

Our tools display data from third-party sources including CISA, NIST NVD, and ransomware tracking feeds. While we link directly to authoritative government sources, we make no warranty that this data is complete, current, or error-free at any given moment.

Live data feeds: CVE data from NIST NVD, CISA Known Exploited Vulnerabilities (KEV), and ransomware victim data are pulled in real time from public APIs. Swamp Fox Cyber Defense does not independently verify this data — it is provided as-is from the originating source. Always verify critical vulnerability information directly at nvd.nist.gov and cisa.gov/kev.

CVE and KEV data is sourced from NIST NVD and CISA respectively, which are U.S. government public-domain resources. Default credential information is compiled from publicly available vendor documentation. Ransomware group profiles are compiled from public threat intelligence reporting and do not contain non-public law enforcement information.

References to CISA, NIST, FBI IC3, SANS Institute, or other organizations on this site do not imply endorsement by those organizations of Swamp Fox Cyber Defense, its services, or its tools.

06 — Limitations

Disclaimer of Warranties & Limitation of Liability

ALL TOOLS AND CONTENT ON THIS SITE ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. SWAMP FOX CYBER DEFENSE MAKES NO WARRANTIES REGARDING ACCURACY, COMPLETENESS, RELIABILITY, OR FITNESS FOR A PARTICULAR PURPOSE.

TO THE MAXIMUM EXTENT PERMITTED BY PENNSYLVANIA LAW, SWAMP FOX CYBER DEFENSE AND ANDREW WELLMAN SHALL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES ARISING FROM:

Reliance on AI-generated analysis from any tool on this site
Inaccurate, outdated, or incomplete CVE or threat data displayed by our tools
Any security incident, data breach, or financial loss that occurs despite use of these tools
Interruptions in tool availability due to API outages (NIST NVD, Google Gemini, CISA)

These free tools are educational resources. They are not a substitute for a professional cybersecurity engagement. For a formal security assessment of your business, book a free consultation.

07 — Contact

Questions & Contact

If you have questions about these Terms of Use, need to report misuse, or would like written permission to use our tools in a commercial or educational setting, contact:

Andrew Wellman, CISSP · SecurityX · GIAC GRID
Swamp Fox Cyber Defense
Chambersburg, Pennsylvania
andrew@swampfoxcyber.org
swampfoxcyber.org/appointments