Compliance & Privacy

Terms of Service

Last updated: February 17, 2026

Back to HomeContents: 6 sections

1. Acceptance of Terms

By accessing or using the MyVuln platform, you agree to be bound by these Terms of Service. These terms constitute a legally binding agreement between you and MyVuln regarding your use of our threat intelligence services.

2. Service Scope

"Service" refers to the MyVuln platform, including the dashboard, Public API, and documentation. MyVuln provides intelligence "as-is" for informational purposes to assist in vulnerability management.

3. Acceptable Use

Users are responsible for maintaining the confidentiality of their credentials. You agree not to:

  • Reverse engineer or attempt to extract the source code of our sync engine.
  • Use the Public API for high-frequency scraping beyond the documented rate limits.
  • Utilize the intelligence provided for any illegal or malicious activity.

4. Intellectual Property

All proprietary algorithms, the "Cyber-Glass" design system, and localized content are the exclusive property of MyVuln. We grant you a limited, non-exclusive license for internal security operations.

5. Limitation of Liability

MyVuln aggregates data from external sources. While we strive for 100% accuracy, we are not liable for any damages resulting from reliance on the intelligence provided. Security remediation remains the sole responsibility of the user.

6. Termination

We reserve the right to suspend or terminate accounts that violate these terms, specifically targeting unauthorized API usage or fraudulent activities.

Real-time threat dataAnalyst-led workflowExports and automation

The public experience stays aligned with the operational MyVuln workspace.

MyVuln
Exports and automation

Real-time threat intelligence for security professionals.

Data: NIST NVD, CISA KEV, USOM, Microsoft MSRC, GitHub, and 34+ global sources

Feeds

34+

Locale

TR/EN

Mode

Live

Real-time threat dataAnalyst-led workflowExports and automation

2026 MyVuln. All rights reserved.

Built for cybersecurity professionals