AegisSpeed End User License Agreement
AegisSpeed End User License Agreement
Version: V1.0.0
Effective Date: February 24, 2026
Important Notice
Please read all the terms of this End User License Agreement (hereinafter referred to as "this Agreement") carefully before using AegisSpeed (hereinafter referred to as "this Software"). Your act of downloading, installing, copying, or using this Software constitutes your full understanding and acceptance of all the terms of this Agreement, becoming a party to this Agreement. If you do not agree to any part of this Agreement, please stop using this Software immediately.
Article 1: Definitions and Interpretation
1.1 Definitions
Unless otherwise specified in this Agreement, the following terms shall have the following meanings:
| Term | Definition |
|---|---|
| This Software | Refers to the AegisSpeed software and all its components developed by SHICTHRS, Std. (hereinafter referred to as "the Developer"), including but not limited to client programs, server programs, web portals, documentation sites, source code, binary files, configuration files, library files, documentation, and any updated versions |
| ASAC Kernel | Refers to the AegisSpeed Security Audit Core and AegisSpeed SHICTHRS Anti Cheat built into this Software, including security check modules such as virtual machine detection, system activity analysis, USB/PCIe/ACPI/Bluetooth device monitoring, and process protection |
| User | Refers to natural persons, legal persons, or other organizations using this Software in accordance with this Agreement |
| Usage Environment | Refers to the hardware environment, software environment, and network environment required for this Software to run normally |
| Data | Refers to various types of information generated or submitted by the User during the use of this Software, including but not limited to system information, hardware information, user account information, check logs, etc. |
| Third-Party Services | Refers to external services that may be called by this Software, including but not limited to Alibaba Cloud real-person authentication services, database services, etc. |
1.2 Interpretation
- The headings in this Agreement are for convenience only and shall not affect the interpretation of this Agreement;
- "Including" or "includes" in this Agreement shall be understood as "including but not limited to";
- All times referred to in this Agreement are Beijing Time (UTC+8).
Article 2: Intellectual Property Rights
2.1 Ownership
The intellectual property rights of this Software and all its components (including but not limited to source code, binary files, documentation, icons, interface design, technical solutions, algorithms, etc.) belong to SHICTHRS, Std.
2.2 License
This Software is licensed under the GNU General Public License v3.0 (hereinafter referred to as "GPLv3") open source license, but certain proprietary components and third-party services in this Agreement are not within the scope of open source.
2.3 Prohibited Acts
Users shall not and shall not allow others to:
- Decompile, disassemble, reverse engineer, or otherwise attempt to obtain the source code of this Software (unless expressly permitted by applicable law and within the scope of the GPLv3 license);
- Delete, modify, or obscure any copyright notices, trademark notices, or other intellectual property notices in this Software;
- Unauthorized use, development, or distribution of derivative works based on this Software;
- Use this Software for any illegal purpose or any act that infringes on the legitimate rights of others;
- Bypass, crack, or attempt to bypass/crack any technical protection measures of this Software;
- Unauthorized sublicensing, relicensing, or commercial distribution of this Software.
Article 3: License Grant
3.1 Scope of Authorization
Provided that the User fully complies with this Agreement, the Developer grants the User the following non-exclusive, non-transferable, limited rights:
- Personal Use License: The User has the right to install and use this Software for personal non-commercial purposes on personal computers that meet the usage environment requirements;
- Academic Research License: The User has the right to use this Software in academic institutions for legitimate teaching and research activities;
- Source Code Access Rights: The User has the right to access, download, and use the open source code of this Software in accordance with the terms of the GPLv3 license.
3.2 Commercial Use
This Software is NOT permitted for any commercial purposes. Commercial use requires a separate written commercial license agreement with the Developer and payment of corresponding fees. Unauthorized commercial use constitutes a material breach of this Agreement.
3.3 Server Deployment
If the User needs to deploy the server components of this Software, the following regulations shall be followed:
- Server components may only be deployed in environments that meet security standards;
- The User shall be responsible for the security configuration and maintenance of the server;
- The User shall not modify, obfuscate, or remove any marks and declarations in the server components;
- The User shall bear all responsibilities and risks associated with server deployment.
Article 4: User Obligations
4.1 Basic Obligations
When using this Software, the User undertakes to:
- Provide true, accurate, and complete registration information;
- Properly safeguard account information and authentication credentials;
- Comply with this Agreement and applicable laws and regulations;
- Not engage in any act that may harm the interests of this Software, the Developer, or third parties;
- Timely update the software version to obtain security updates and functional improvements.
4.2 Usage Environment Requirements
The User shall ensure that the usage environment meets the following requirements:
| Item | Requirement |
|---|---|
| Operating System | Windows 10 / Windows 11 (64-bit) |
| Processor | Intel Core i5 or equivalent or higher |
| Memory | At least 8GB RAM |
| Storage | At least 500MB available disk space |
| Python | 3.11 or higher |
| Network | Internet connection required for some features |
| Permissions | Administrator privileges required to run security check functions |
4.3 Account Security
- The User shall properly safeguard their account information, including ID number, password, Token, etc.;
- The User shall not transfer, lend, or disclose account information to any third party;
- The User shall bear all consequences resulting from the leakage of account information;
- The User shall immediately notify the Developer upon discovering any account anomalies.
4.4 Compliance Use
The User undertakes not to use this Software:
- For any unauthorized security testing or penetration testing;
- To bypass or attempt to bypass any security mechanisms;
- To interfere with, damage, or attempt to interfere with/damage any third-party systems, networks, or services;
- To engage in any illegal activities or acts that infringe on the legitimate rights of others;
- For continuous monitoring of any specific target (unless explicitly authorized by law).
Article 5: Privacy and Data Protection
5.1 Data Collection
This Software may collect the following types of data during operation:
- System Information: Operating system version, hardware configuration, device information, etc.;
- Usage Data: Feature usage, error logs, performance data, etc.;
- Account Information: Identity information, contact information provided by the User during registration;
- Check Data: Logs and results generated when the ASAC Kernel performs security checks;
- Network Data: IP address, browser identifier, and other access information.
5.2 Data Use
The Developer undertakes to use collected data only for:
- Providing, maintaining, and improving this Software services;
- Verifying user identity and account security;
- Fulfilling legal obligations and regulatory requirements;
- Resolving technical faults and security issues;
- Providing necessary service notifications and updates to users.
5.3 Data Storage and Security
- The Developer will take reasonable technical and management measures to protect the security of user data;
- User data is stored on servers that meet security standards;
- The Developer will not sell or rent user data to third parties without user consent;
- Unless required by law or with user consent, the Developer will not disclose user data to third parties.
5.4 User Rights
Users have the following rights regarding their data:
- Right of Access: The right to inquire about the processing of personal data;
- Right of Correction: The right to request correction of inaccurate personal data;
- Right of Deletion: The right to request deletion of personal data (except as otherwise provided by law);
- Right to Data Portability: The right to receive personal data in a structured, commonly used, machine-readable format.
5.5 Third-Party Services
This Software may integrate the following third-party services:
| Service Type | Service Provider | Purpose |
|---|---|---|
| Identity Authentication | Alibaba Cloud Real-person Authentication Service | Verify user identity information |
| Database | MySQL | Store user account and check data |
| Cloud Services | Alibaba Cloud | Provide infrastructure support |
By using this Software, the User agrees to the use of the above third-party services.
Article 6: Disclaimer
6.1 Software as Is
This Software is provided on an "as is" and "as available" basis. The Developer makes no express or implied warranties regarding this Software, including but not limited to:
- This Software is free from errors, viruses, or other harmful components;
- This Software will meet the User's specific needs or expectations;
- This Software will be uninterrupted, timely, secure, or reliable;
- The results of using this Software will be correct or effective.
6.2 Functional Risks
The User expressly understands and agrees that:
- Limitations of Security Checks: The security check functions of the ASAC Kernel are based on known feature libraries and rules, and may not be able to detect all types of security threats or cheating behaviors;
- False Positive Risk: Security checks may produce false positives, and the User should independently judge the accuracy of check results;
- System Impact: This Software may impact system performance, and in some cases may cause system instability;
- Compatibility: This Software may be incompatible with certain hardware or software;
- Service Availability: Some functions of this Software require connecting to external servers, and these services may experience interruptions or unavailability.
6.3 Exclusion of Liability
To the maximum extent permitted by applicable law, the Developer shall not be liable for any of the following:
- Any indirect, incidental, special, or consequential damages arising from the use or inability to use this Software;
- Any loss of profits, business interruption, data loss, or other monetary damages arising from this Software;
- Any damages caused by the acts of the User or third parties;
- Any damages caused by third-party service interruptions or malfunctions;
- Any damages caused by the User's breach of this Agreement.
Article 7: Limitation of Liability
7.1 Limitation Cap
Regardless of any other provisions in this Agreement, the Developer's total liability for compensation arising from this Software or this Agreement shall not exceed:
- One Chinese Yuan (RMB ¥1)
7.2 Exceptions
The above limitation of liability does not apply to the following circumstances:
- Damages caused by the Developer's intentional or gross negligence;
- The Developer's violation of consumer rights protection obligations under applicable laws;
- Damages arising from the Developer's infringement on the User's personal rights (such as life, health, personal freedom);
- Circumstances where liability cannot be limited under applicable laws.
7.3 Risk Assumption
The User assumes all risks of using this Software. The Developer is not responsible for any risks or damages that may arise from using this Software.
Article 8: Service Terms
8.1 Service Status
- The Developer has the right to adjust, suspend, or terminate part or all of this Software's services as actual circumstances require;
- The Developer does not guarantee that all functions of this Software will be available at all times;
- The Developer has the right to upgrade, update, or modify this Software according to business development needs;
- The Developer has the right to restrict or suspend certain functions for security reasons.
8.2 API Interfaces
- The API interfaces provided by this Software are only for use by this Software's client;
- The Developer is not responsible for any issues arising from third-party use of API interfaces;
- The Developer has the right to modify, restrict, or terminate access to API interfaces as actual circumstances require.
8.3 Account Management
- Users need to provide true identity information when registering an account;
- The Developer has the right to review, restrict, or ban accounts according to laws, regulations, or business needs;
- Accounts may be banned due to long-term inactivity or breach of this Agreement.
Article 9: Violation Handling
9.1 Violation Behaviors
If a User engages in any of the following behaviors, it shall be deemed a serious breach of this Agreement:
- Attempting to crack, reverse engineer, or circumvent technical protection measures of this Software;
- Using this Software for any illegal activities;
- Unauthorized commercial use;
- Infringing on the intellectual property rights of this Software;
- Attempting to obtain, modify, or destroy other users' data;
- Interfering with or disrupting the normal operation of this Software;
- Providing false information or impersonating others;
- Engaging in any act that may harm the interests of the Developer or other users.
9.2 Handling Measures
For users who violate this Agreement, the Developer has the right to take the following measures:
- Issuing warning notices;
- Suspending or restricting account functions;
- Permanently banning the account;
- Pursuing legal liability;
- Requiring compensation for losses.
Article 10: Agreement Changes
10.1 Right to Modify
The Developer has the right to modify this Agreement at any time as actual circumstances require. The modified Agreement will be published through the following channels:
- Official documentation site: AegisSpeed Documentation Site
- Software client built-in prompts
- Official announcement channels
10.2 Notice Methods
- Important changes will be notified to users through in-client notifications, email, or official website announcements;
- Users have the obligation to check the latest version of this Agreement regularly;
- Continued use of this Software constitutes acceptance of the modified Agreement.
10.3 Objection Handling
If the User does not agree to the modified Agreement, they should immediately stop using this Software. Continued use of this Software constitutes acceptance of the modified Agreement.
Article 11: Termination
11.1 User Termination
The User has the right to terminate this Agreement by:
- Uninstalling and deleting all copies of this Software;
- Stopping all services of this Software;
- Submitting an account cancellation application to the Developer.
11.2 Developer Termination
The Developer has the right to terminate this Agreement under the following circumstances:
- Serious breach of this Agreement by the User;
- Termination required by laws, regulations, or court judgments;
- This Software ceases operation;
- The Developer believes termination is in the common interest of the User and the Developer.
11.3 Post-Termination Handling
- After termination, the User shall immediately stop using this Software;
- Obligations and responsibilities incurred by the User before termination shall not be exempted due to Agreement termination;
- The Developer has the right to retain necessary data and records according to laws and regulations.
Article 12: Dispute Resolution
12.1 Applicable Laws
The formation, execution, and interpretation of this Agreement are all governed by the laws of the People's Republic of China (excluding the laws of Hong Kong, Macau Special Administrative Region, and Taiwan).
12.2 Dispute Resolution
- Any disputes arising from or related to this Agreement shall first be resolved through friendly negotiations;
- If negotiation fails, either party has the right to file a lawsuit with the people's court where the Developer is located;
- During litigation, except for the disputed matters, other terms of this Agreement shall continue to be effective.
12.4 Arbitration Prerequisite
If applicable law requires, both parties shall first undergo arbitration before filing a lawsuit in court. Arbitration shall be conducted at the arbitration commission where the Developer is located.
Article 13: Miscellaneous Provisions
13.1 Complete Agreement
This Agreement (including this Agreement body and all attachments) constitutes the complete agreement between the User and the Developer regarding this Software, replacing all previous forms of communication, negotiation, or agreements between both parties.
13.2 Severability
If any provision of this Agreement is determined to be invalid, illegal, or unenforceable, such provision shall be executed to the maximum extent permitted by law, and the remaining provisions shall remain valid.
13.3 Waiver
The Developer's failure to exercise or delay in exercising any rights or remedies under this Agreement shall not constitute a waiver of such rights or remedies. The Developer's single or partial exercise of any rights or remedies shall not preclude further exercise of such rights or remedies or any other rights or remedies.
13.4 Assignment
The User may not assign any rights or obligations under this Agreement without the written consent of the Developer. The Developer has the right to assign rights and obligations under this Agreement to affiliated companies or third parties.
13.5 Notices
Unless otherwise specified in this Agreement, notices related to this Agreement shall be delivered in the following ways:
- Developer notices: Through official website announcements, in-client notifications, or registered email;
- User notices: Through the user's registered email or built-in contact methods in this Software.
13.6 Third-Party Beneficiaries
Except as otherwise expressly provided in this Agreement, this Agreement does not create any rights or interests for any third party.
13.7 Export Compliance
The User undertakes to comply with applicable import and export laws and regulations, and shall not export or re-export this Software to sanctioned countries or regions, nor use it for prohibited purposes.
Appendix I: Open Source Component Licenses
This Software contains the following open source components, which are subject to their respective licenses:
| Component | License |
|---|---|
| Python | PSF License |
| PySide6 | LGPL v3 |
| FastAPI | MIT License |
| VuePress | MIT License |
| React | MIT License |
Please refer to the official license files of each component for detailed information.
Appendix II: Server API Status
For the current status of this Software's server API, please refer to: API Status Documentation
Appendix III: Contact Us
| Contact Channel | Information |
|---|---|
| Official Website | AegisSpeed Official Website |
| Documentation Site | AegisSpeed Documentation Site |
| GitHub | AegisSpeed GitHub Repository |
| Technical Support | support@mail.shicthrs.com |
© 2026 SHICTHRS, Std. All Rights Reserved.
The final interpretation right of this Agreement belongs to SHICTHRS, Std.