i10X Usage Guidelines and Fair Use Policy

Last updated: March 25, 2026


These Usage Guidelines and Fair Use Policy ("Guidelines") explain what is and is not allowed on i10X. They apply to all users, all plans, and all use of the Services, including creation or use of AI agents on the platform.

These Guidelines are incorporated into the i10X Terms of Service and Subscriber Terms.


1. General Rule

Use i10X lawfully, responsibly, and in a manner that does not harm i10X, third parties, or other users.

You must not use the platform in a way that is illegal, deceptive, dangerous, abusive, evasive, exploitative, or technically disruptive.


2. Prohibited Uses

You may not use i10X for or in connection with:

  • illegal activity;
  • fraud, deception, phishing, impersonation, or identity misuse;
  • malware, credential theft, spyware, ransomware, botnets, or harmful code;
  • infringement of intellectual property or privacy rights;
  • unlawful surveillance or data harvesting;
  • hateful, violent, exploitative, or sexually abusive content where prohibited by law or provider policies;
  • exploitation or abuse of minors;
  • unlawful discrimination or harassment;
  • unlawful medical, legal, financial, or other regulated advice where prohibited by applicable law or provider restrictions;
  • generating or distributing content intended to facilitate crime, violence, or evasion of law enforcement;
  • disinformation, manipulation, or deceptive political or social influence operations in violation of applicable law;
  • reverse engineering, probing, or extraction of platform data or systems;
  • competing model or product development using prohibited platform extraction; or
  • any use that violates third-party provider policies applicable to the relevant model or tool.

3. External Bots and Automation Are Not Allowed

External automated access to i10X is prohibited.

You may not access or use i10X through:

  • bots;
  • scripts;
  • browser automation tools;
  • robotic process automation tools;
  • headless browsers;
  • click automation systems;
  • agent frameworks driving the interface;
  • custom wrappers or orchestration layers;
  • device farms;
  • "humanized" or human-mimicking automation; or
  • Clawdbot / OpenClaw and similar services.

This rule applies whether the automation is fully autonomous, semi-autonomous, human-supervised, or designed to mimic ordinary user behavior.

For clarity, the following are prohibited:

  • automating prompt submission or response collection;
  • queueing jobs for unattended execution;
  • using one person to supervise many automated sessions;
  • using i10X as a hidden backend for another product or workflow;
  • simulating humans to evade usage controls; and
  • using automation to consume "unlimited" features at industrial scale.

Important distinction: AI agents that users build inside i10X using approved product features are not automatically prohibited. What is prohibited is using external automation or automation-like behavior to access or exploit the platform itself.


4. Fair Use for "Unlimited" and High-Access Plans

Where a plan is described as "unlimited," it is still subject to fair use.

Fair use means usage that is:

  • interactive;
  • directly initiated by an authorized user;
  • reasonable in volume and frequency;
  • consistent with ordinary end-user behavior; and
  • not intended to exploit pricing or overload the service.

Fair use does not include:

  • 24/7 or near-continuous non-human usage;
  • excessive parallel sessions or concurrency;
  • sustained throughput inconsistent with human interaction;
  • using the service as a batch processor;
  • repeated large-scale extraction of outputs;
  • account sharing, pooling, or seat splitting;
  • use that materially degrades performance for others; or
  • use that materially increases provider or infrastructure costs outside intended plan economics.

We may use behavioral, technical, payment, device, network, and operational signals to assess whether usage falls outside fair use.


5. Anti-Circumvention Rules

You may not attempt to bypass, evade, disable, or work around any i10X limitation, rule, control, or safeguard.

This includes:

  • creating multiple accounts to obtain more usage;
  • rotating cards, emails, devices, browser profiles, or IPs;
  • using proxies or VPNs to evade restrictions;
  • bypassing cooldowns, queues, or throttling;
  • evading suspensions or terminations;
  • exploiting bugs or edge cases in billing or usage logic;
  • disguising automation as human activity; or
  • using another user's account or subscription.

6. Sharing, Resale, and Commercial Exploitation

Unless expressly authorized by i10X in writing, you may not:

  • share accounts or credentials;
  • pool access across multiple people;
  • rent or resell access;
  • use i10X on a white-label or managed-service basis;
  • provide outputs to third parties as part of a hosted commercial service powered by a single end-user subscription; or
  • use consumer-priced plans as substitute infrastructure for commercial processing pipelines.

7. Third-Party Provider Rules

Many i10X features rely on third-party providers. Your use must comply not only with these Guidelines, but also with any provider rules that apply to the feature or model being used.

We may enforce provider restrictions directly and may restrict or remove access where needed to comply with provider requirements.


8. Enforcement

To protect i10X, our users, and our providers, we may take any action we consider appropriate in response to violations or suspected violations, including:

  • warnings;
  • feature restrictions;
  • model restrictions;
  • cooldowns or throttling;
  • temporary holds;
  • human verification;
  • content removal;
  • account review;
  • refund denial;
  • reversal of credits or promotions;
  • suspension; and
  • permanent termination.

We may take action based on reasonable suspicion and are not required to disclose the exact details of our detection methods, risk models, thresholds, or internal evidence.


9. Reporting and Cooperation

You must cooperate with reasonable requests relating to abuse investigations, account verification, payment verification, or security reviews.

Failure to cooperate may result in restricted access or suspension.


10. Changes to These Guidelines

We may modify these Guidelines from time to time to reflect changes in product design, abuse patterns, provider requirements, cost controls, legal requirements, or operational needs.

Updated Guidelines become effective as described in the Terms of Service.


Contact Us
support@i10x.ai

i10X Global Pte Ltd
77 High Street, #07-10
Unit 4255
179433 Singapore