End User License Agreement

PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THIS PRODUCT. BY DOWNLOADING, INSTALLING OR USING THIS PRODUCT, YOU ACCEPT AND AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT.

IF YOU DO NOT AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT, DO NOT DOWNLOAD, INSTALL OR USE THIS PRODUCT.

This Software Transaction Agreement (the “Agreement”) is made between you, the Customer (“Customer” or “You”) and the Provider, as defined below.

1. Definitions

  • “Documentation” means any user manuals or documentation that Provider may make available for the Software.

  • “Products” means the Software provided to Customer under this Agreement.

  • “Provider” means MAMORI LLC

  • “Software” means the object code version of the software that is provided or made available to Customer.

2. Software License & Security Practices

a. AS IS License. Subject to the terms of this Agreement, Provider grants to Customer a non-exclusive, non-transferable, non-sublicensable license to use the Software. Customer accepts the Software “AS IS” and is solely responsible for all aspects of its deployment, implementation, and use.

b. Provider’s Security Commitments. For every version of the Software, Provider guarantees it will maintain the following security practices during development:

  • Static Application Security Testing (SAST): Automated code scanning performed daily to identify potential vulnerabilities and coding errors.

  • Dynamic Application Security Testing (DAST): Penetration testing conducted daily to identify runtime vulnerabilities in deployed application environments.

  • CVE Remediation: All reported Common Vulnerabilities and Exposures (CVEs) identified in software dependencies are resolved within twenty-four (24) hours of disclosure.

  • Threat Intelligence: Provider utilizes intelligence from active honeypot systems monitoring real-world attack patterns to inform security enhancements.

c. Certification Disclaimer. The Software is designed for self-hosted deployment. The Software itself cannot and does not hold ISO, SOC, or similar organizational certifications, as these frameworks certify operational environments and controls, not software code.

d. No Data Access. The Software contains no telemetry, analytics, or data transmission capabilities that communicate with Provider systems. Provider maintains no production infrastructure that processes, stores, or transmits customer data and does not collect, access, store, or process any customer data.

3. Restrictions

Customer may not reverse engineer, decompile, disassemble, or attempt to discover or modify the underlying source code of the Software. Customer may not modify, adapt, rent, lease, loan, create derivative works of, resell, sublicense or distribute the Products or Documentation.

4. No Warranties

THE SOFTWARE AND DOCUMENTATION ARE PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, PROVIDER DISCLAIMS ALL WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, SATISFACTORY QUALITY, AND ANY WARRANTIES ARISING FROM USAGE OF TRADE OR COURSE OF DEALING OR PERFORMANCE. PROVIDER DOES NOT WARRANT THAT THE SOFTWARE WILL MEET CUSTOMER’S REQUIREMENTS, OPERATE WITHOUT INTERRUPTION, OR BE ERROR-FREE. THE SECURITY COMMITMENTS IN SECTION 2(b) OUTLINE DEVELOPMENT PRACTICES BUT DO NOT CONSTITUTE A WARRANTY OF SECURITY OR FITNESS FOR A PARTICULAR PURPOSE.

5. High-Risk Disclaimer

CUSTOMER UNDERSTANDS AND AGREES THAT THE PRODUCTS ARE NOT FAULT-TOLERANT AND ARE NOT DESIGNED OR INTENDED FOR USE IN ANY HIGH-RISK OR HAZARDOUS ENVIRONMENT. ANY USE OF THE PRODUCTS BY CUSTOMER IS AT CUSTOMER’S SOLE RISK.

6. Limitation of Liability

TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL PROVIDER, ITS AFFILIATES OR SUPPLIERS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, OR PUNITIVE DAMAGES, INCLUDING BUT NOT LIMITED TO LOSS OF PROFITS, LOSS OF BUSINESS, LOSS OF DATA, OR OTHER COMMERCIAL DAMAGES, HOWSOEVER ARISING, WHETHER IN CONTRACT, TORT, OR OTHERWISE, EVEN IF PROVIDER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

PROVIDER’S TOTAL AGGREGATE LIABILITY UNDER THIS AGREEMENT SHALL NOT EXCEED THE AMOUNT OF FIFTY DOLLARS ($50.00). THIS ALLOCATION OF RISK IS AN ESSENTIAL PART OF THE BARGAIN BETWEEN THE PARTIES.

7. Customer Responsibilities

Customer is solely responsible for: - All infrastructure, hardware, and system requirements - Installation, configuration, deployment, and operational security of the Software - Security of Customer’s systems and data, including control implementation and enforcement - Backups and disaster recovery - Compliance with all applicable laws, regulations, and internal policies - All aspects of system administration, access control, network security, and incident response - Any costs, damages, or losses resulting from Customer’s use or deployment of the Software

8. Termination

This Agreement may be terminated by either party immediately upon notice. Upon termination, Customer shall immediately cease using the Software and destroy all copies.

9. General

a. Governing Law. This Agreement shall be governed by the laws of the State of California.

b. Entire Agreement. This Agreement constitutes the complete agreement between the parties and supersedes all prior or contemporaneous agreements or representations.

c. Severability. If any provision of this Agreement is held invalid, the remainder shall continue in full force and effect.

10. Acknowledgment

CUSTOMER ACKNOWLEDGES THAT CUSTOMER HAS READ THIS AGREEMENT, UNDERSTANDS IT, AND AGREES TO BE BOUND BY ITS TERMS. CUSTOMER FURTHER AGREES THAT THIS AGREEMENT IS THE COMPLETE AND EXCLUSIVE STATEMENT OF THE AGREEMENT BETWEEN THE PARTIES. CUSTOMER SPECIFICALLY ACKNOWLEDGES THAT THE SOFTWARE IS SELF-HOSTED AND THAT CUSTOMER BEARS SOLE RESPONSIBILITY FOR ITS DEPLOYMENT, OPERATION, AND SECURITY WITHIN ITS ENVIRONMENT.