God's Eye is a powerful security reconnaissance tool. With great power comes great responsibility.
✅ DO:
- Use for authorized penetration testing
- Participate in bug bounty programs
- Conduct security research on your own systems
- Help improve security through responsible disclosure
- Follow coordinated vulnerability disclosure processes
❌ DO NOT:
- Scan systems without explicit permission
- Use for malicious purposes
- Violate terms of service
- Attempt unauthorized access
- Sell or distribute scan results without authorization
If you discover a security vulnerability in God's Eye itself, please report it responsibly:
- DO NOT open a public issue
- Email the maintainers privately (see GitHub profile for contact)
- Provide detailed information:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Fix Development: Depends on severity
- Public Disclosure: After fix is released
- Always verify authorization before scanning
- Keep the tool updated to latest version
- Use in controlled environments when testing
- Respect rate limits to avoid service disruption
- Secure your scan results - they may contain sensitive data
- Review code changes for security implications
- Follow secure coding practices
- Test thoroughly before releasing
- Document security-relevant changes
- Never commit credentials or sensitive data
Users must comply with:
- United States: Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030
- European Union: GDPR, ePrivacy Directive, NIS2 Directive
- United Kingdom: Computer Misuse Act 1990
- International: Budapest Convention on Cybercrime
- Local laws: All applicable regional regulations
When using God's Eye for bug bounty hunting:
- ✅ Read and follow program rules
- ✅ Respect scope limitations
- ✅ Avoid testing production systems unless explicitly allowed
- ✅ Report findings through proper channels
- ✅ Do not publicly disclose before program authorization
Scan results may contain sensitive information:
- Private IP addresses
- Technology stack details
- Potential vulnerabilities
- Configuration information
Your Responsibilities:
- Store results securely
- Encrypt sensitive data
- Delete when no longer needed
- Do not share without authorization
- Comply with GDPR and data protection laws
NO WARRANTY: This software is provided "AS IS" without warranty of any kind.
NO LIABILITY: The authors are not responsible for:
- Misuse of this tool
- Unauthorized access attempts
- Legal consequences of improper use
- Data breaches or security incidents
- Any damages arising from use
USER RESPONSIBILITY: You are solely responsible for ensuring:
- You have proper authorization
- Your use complies with all laws
- You accept all risks
- You will not hold authors liable
For security-related questions:
- Check the LICENSE file for legal terms
- Review the README for usage guidelines
- Contact maintainers through GitHub for private security reports
Remember: Unauthorized computer access is illegal. Always get permission first.