Skip to content

Last updated 2026-05-13

Acceptable Use Policy

Loom gives you a chat that fans out into a swarm of agents with real tools — they can fetch web pages, run code, open pull requests, post to Slack, and call third-party APIs on your behalf. That power deserves a few clear lines. Violating this policy can result in immediate account suspension and, in serious cases, referral to law enforcement.

You will not

  • Break the law. No use of Loom for activity that is illegal where you are or where we operate, including export-control violations, fraud, or money laundering.
  • Generate child sexual abuse material or any content that sexualizes minors, in any form.
  • Harass or threaten a specific person, including via generated messages an agent would send on your behalf (Slack, email, GitHub comments). No doxxing, no stalking.
  • Build weapons. No detailed instructions for manufacturing weapons capable of mass casualties — chemical, biological, radiological, nuclear, or kinetic.
  • Compromise systems you don't own.Loom's tools are not for unauthorized vulnerability scanning, credential stuffing, or any other access you have not been granted in writing.
  • Distribute malware. No use of code_exec or git tools to ship malware, ransomware, or stalkerware.
  • Run influence operations. No coordinated inauthentic behavior on social platforms, fake reviews, astroturfing, or deepfakes of real people without consent.
  • Infringe intellectual property.Don't use Loom to scrape behind paywalls, bypass DRM, or generate content that knowingly infringes a third party's copyright or trademark.
  • Evade safety controls. No prompts designed to jail- break the underlying models, no attempts to escape tool sandboxes, no use of Loom to launder requests another provider has refused.
  • Resell the product. You may use Loom inside your own product, but you may not white-label it as a competing orchestration platform without a written agreement.

Reporting abuse

See an account or piece of content that violates this policy? Email abuse@mingllm.com with as much context as you can share. Reports are read by a human, not an agent.

Enforcement

We will warn, throttle, suspend, or terminate accounts based on the severity of the violation. For high-risk categories (CSAM, weapons, malware), suspension is immediate and we cooperate with law enforcement as required.