Terms of Service
Last updated:
This content is provided for informational purposes and does not constitute legal advice. Andain Router is built around Bring Your Own Key (BYOK): your organization supplies credentials to upstream model providers; configure and review obligations with counsel before relying on these pages in production.
Welcome. These Terms of Service ("Terms") govern access to websites, repositories, downloadable software artifacts, containers, Helm charts (if offered), APIs, dashboards, signup flows, commercially-supplied enhancements, consulting deliverables referencing Router ("Software") and supplemental documentation collectively describing routing and integration options for inference requests routed using credentials your organization configures for third-party inference providers ("Provider Keys" or BYOK — bring your own key), together the "Service." By using any part of the Service you agree to these Terms. If an entity accepts on behalf of a company, "you" binds that entity. If you disagree, discontinue use.
If you procure managed or hosted Router pursuant to an order form, statement of work, or separate agreement ("Paid Offering") that expressly references supplementary commercial terms (Addendum), the Addendum prevails where it conflicts concerning fees, SLAs, data processing, subcontractors, audits, indemnities for paid scope, confidentiality, renewal, and termination for cause specific to subscriptions.
Eligibility
- You have legal capacity or authority to bind the organization you represent.
- Your use complies with sanctions, export controls, cryptographic rules, telecom and sector regulations, and other laws that apply where you deploy integrations.
Nature of Router and BYOK
Open source and modular deployment
Router ships as open-source or source-available artifacts you may inspect, fork, customize, integrate, audit, and compile. Unless you voluntarily choose a Paid Offering operated by us, you host execution on premises or your cloud tenancy. Licenses for source code reside in repository license files (e.g., SPDX). When those licenses apply, they supersede generic statements here about Software licensing to the extent expressly stated therein.
Bring your own provider keys
- You supply Provider Keys. By default, Router integrates with providers using credentials issued to your organization (API keys, OAuth tokens, vault references, etc.). Except where any separate paid or promotional program explicitly describes otherwise on our site or in contract, Router's publishers do not resell pooled provider capacity as your primary integration path.
- Your compliance scope. You are responsible for agreements with downstream customers (if any), key rotation and storage, quotas, billing with providers, model and content policies, privacy notices, data protection agreements, subprocessors lists, DPIAs where required, international transfers with providers, and regulatory correspondence — unless your organization has expressly procured hosted Router governed by written data processing terms tailored to that environment.
- Third-party outages and SLAs. Latency, accuracy, outages, pricing changes, endpoint deprecations, and moderation decisions originate with providers or on paths outside our control unless a Paid Offering states measurable commitments. You configure retries, fallbacks, budget limits, and monitoring.
- Embedding Router in your product. If you expose Router-backed functionality to paying customers, your contracts with those customers define their legal relationship — not these Terms — unless you knowingly misrepresent affiliation with Andain Router or falsely attribute availability we did not supply.
Accounts, credentials, invitations
Hosted Router may require accounts, SSO federation, MFA, API tokens, webhook secrets, egress allowlists, and similar secrets. Keep them confidential, rotate promptly, investigate suspected compromise immediately, and follow our coordinated disclosure policy for security-sensitive reports. Automated mass signups solely to spam, evade metering, imitate unrelated brands or individuals, scrape non-public surfaces contrary to robots terms, sabotage repos, forge requests, abuse trials, inject malware — are prohibited regardless of tooling.
Acceptable use
- Do not violate applicable law — including misuse of minors' likenesses, grooming, trafficking, scams, extortion, or distribution of sexually exploitative imagery. We escalate credible reports promptly and cooperate with lawful process where obligated.
- Do not misuse stolen credentials, circumvent agreed metering, attack or degrade ours or anyone else's infrastructure without authorization, automate harassment, send unsolicited unlawful bulk marketing, stealth cryptomine on shared tiers without contractual permission, misrepresent AI-authored paid endorsements where that is unlawful, circumvent paywalls in violation of provider terms, scrape disallowed endpoints, misuse biometrics in violation of local rules, or use dark-pattern tactics prohibited where your product is marketed.
- If Router on your infrastructure becomes part of abusive traffic after compromise, mitigate promptly and cooperate in good faith with reasonable remediation requests relating to interoperability or coordinated disclosure.
Third-party providers and open models
Inference providers impose their own pricing, acceptable use, privacy commitments, residency options, uptime disclosures, watermarking schemes, moderation rules, telemetry, SOC or ISO attestations where applicable, breach notice practices, governmental access policies. We cannot guarantee vendor compliance artefacts you may need for audits. Engineering choices — model identifiers, endpoints, deterministic seeds, safety filters, caching, timeouts, logging — belong to your implementation.
If we ever publish optional managed provider keys (for example tightly metered sandbox programs), they will be described with explicit limits, abuse contacts, and privacy statements. Until then, treat Router as BYOK-first: your keys, your commercial and privacy relationship with each provider.
Intellectual property
- OSS components remain under their upstream licenses — comply with attribution notices, reciprocal copyleft if you distribute combined works triggering those clauses, notices files, toolchain obligations.
- Our trademarks ("Andain Router") must not confuse origin; no modified logos implying endorsement; goodwill-preserving nominative references allowed for truthful compatibility claims. Don't register domains designed to spoof project leadership.
- Feedback you provide may be freely used without restriction or royalties to operate, improve — thank you. You retain underlying rights in your proprietary code interoperating unless you contribute under a repo license that grants broader rights expressly.
Paid offerings
Fees, taxes, invoicing cadence, currencies, payment methods, renewals, price changes, consumption true-ups, credits, rollovers, SLAs, exclusions, maintenance windows, suspension and reinstatement for nonpayment, professional services change orders, travel reimbursement, and export classification assistance are governed solely by the order form, statement of work, or other written agreement you execute with us.
Disclaimer of warranties
THE SERVICE AND SOFTWARE ARE PROVIDED "AS IS" AND "AS AVAILABLE." TO THE MAXIMUM EXTENT PERMITTED BY LAW, WE DISCLAIM ALL WARRANTIES, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT, AND NON-INFRINGEMENT. WE DO NOT WARRANT THAT GENERATED OUTPUT IS ACCURATE, COMPLETE, OR SAFE FOR YOUR USE CASE; THAT PROMPT INJECTION OR JAILBREAK ATTACKS WILL BE PREVENTED WITHOUT YOUR SAFEGUARDS; THAT SELF-BUILT OR UNPATCHED BINARIES ARE SECURE; THAT THE SERVICE MEETS HIPAA, PCI, FEDRAMP, OR OTHER REGULATED BASELINES WITHOUT A SEPARATE BUSINESS ASSOCIATE AGREEMENT OR GOVERNMENT AUTHORIZATION; OR THAT CRYPTOGRAPHY WILL RESIST FUTURE ADVANCES. YOU ARE RESPONSIBLE FOR PROMPT HYGIENE, HUMAN REVIEW WHERE APPROPRIATE, AND ARCHITECTURAL CONTROLS.
Limitation of liability
EXCEPT WHERE PROHIBITED BY LAW, NEITHER PARTY IS LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, CONSEQUENTIAL, OR PUNITIVE DAMAGES, INCLUDING LOST PROFITS, GOODWILL, DATA, REPUTATION, OR PROCUREMENT OF SUBSTITUTE SERVICES, EVEN IF ADVISED OF POSSIBILITY. EACH PARTY' AGGREGATE LIABILITY ARISING OUT OF THESE TERMS FOR THE OSS AND UNSUBSCRIBED USE PATH IS LIMITED TO ONE HUNDRED U.S. DOLLARS ($100); FOR ACTIVE PAID ROUTER UNDER AN ORDER FORM, EACH PARTY' AGGREGATE LIABILITY IS LIMITED TO FEES ACTUALLY PAID BY CUSTOMER SUBJECT TO THESE TERMS TO US IN THE TWELVE (12) MONTHS PRECEDING THE FIRST EVENT GIVING RISE TO THE CLAIM, UNLESS A SIGNED SUPPLEMENT INCREASES THE CAP OR CARVES OUT CATEGORY-SPECIFIC OBLIGATIONS. THESE CAPS DO NOT APPLY TO INDEMNITY OBLIGATIONS EXPRESSLY AGREED IN WRITING, GROSS NEGLIGENCE OR WILLFUL MISCONDUCT adjudicated finally, PERSONAL INJURY OR DEATH CAUSED BY NEGLIGENCE, NOR TO AMOUNTS THAT APPLICABLE LAW DOES NOT ALLOW TO BE LIMITED. NOTHING HERE LIMITS LIABILITY BEYOND WHAT THE LAW PERMITS; SEEK COUNSEL FOR JURISDICTION-SPECIFIC ENFORCEMENT.
Indemnification
You will defend and indemnify Andain Router, its affiliates, officers, contractors, and contributors (to the extent applicable) from third-party claims, fines (where assignable), settlements, and reasonable attorneys' fees arising from or related to: (a) your breach of these Terms or applicable law; (b) your configurations, prompts, or outputs used in violation of third-party rights or provider policies; (c) consumer protection or advertising claims tied to how you market AI features in your product; or (d) privacy or security incidents caused by your negligent key handling or failure to adopt documented safeguards for hosted tiers. We cooperate reasonably following written notice. Counsel selection follows conflict rules typical in SaaS bilateral indemnities unless your order states otherwise.
Suspension / termination
- You may cease use freely for OSS contexts not contractually anchored.
- We may suspend or terminate Service or accounts materially breaching Acceptable Use, law, harming security, or repeated payment failure after cures.
- Survive: accrued payment, disclaimers/limit liability to extent enforceable post-termination where law allows, indemnity matured pre-termination, confidentiality, jurisdictional carve-outs, accrued audit rights if any, escrow release conditions if negotiated.
Government and regulated workloads
Dedicated compliance packages (FedRAMP, HIPAA BAA programs, CJIS-aligned hosting, sovereignty certifications, GDPR Article 49 disclosures, bespoke audit rights) appear only where executed addenda expressly say so. Absent those documents, Router is general-purpose software and infrastructure — procure independent suitability reviews before processing regulated categories of data through it or through BYOK-connected providers.
General
- Changes. We may update these Terms. For material updates we will give reasonable advance notice via the website, repository, changelog, billing email on file for paid tiers, or in-product banners. Continuing to use the Service after the effective date constitutes acceptance unless applicable law grants you a termination remedy for Paid Offerings expressly stated elsewhere.
- Assignment. You may not assign these Terms except with our prior consent, not unreasonably withheld for a merger, acquisition, asset sale involving substantially all assets, corporate reorganization, or change of control tied to your entity. We may assign in connection with a merger, financing, divestiture, or sale of substantially all assets, notifying you consistent with GDPR processor notification duties where legally required for hosted tiers.
- Entire agreement. Together with OSS license files bundled with repositories, our Privacy Policy, supplemental order documents, confidentiality agreements, and DPAs negotiated for Paid Offerings where applicable — these Terms constitute the integrated agreement superseding contemporaneous inconsistent oral statements.
- Governing law. Unless a Paid Addendum states otherwise for your entity, substantive law is that of the State of Delaware, United States of America, excluding its conflict-of-law rules. Venue for judicial actions related to OSS-only usage may be stipulated further in OSS licenses; Paid contracts may nominate exclusive courts in Delaware or mutually agreed metros. Mandatory consumer-protection rules in countries where qualifying consumers reside may still apply; consult counsel for tailoring.
- Severability. If any provision cannot be enforced, the remainder continues in force. Temporary failure to enforce a provision is not a waiver.
- Notices. Project-related operational notices rely on repositories and community forums; Paid Offerings add email at the billing or security contact designated in onboarding or order forms unless another channel is stipulated.
Contact
Operational issues: forums at github.com/your-org/andain-router/discussions, security reports follow repo SECURITY policy. Billing or legal escalation per executed order roster.