Terms of Service

Last updated: March 2026

Version: v2026.03.2

1. Acceptance

By signing up for or using Swirls ("Service"), operated by ByteSlice, LLC. ("Company," "we," "us," or "our"), you ("you" or "User") agree to be bound by these Terms of Service ("Terms"). If you are using the Service on behalf of an organization, you represent and warrant that you have the authority to bind that organization to these Terms. If you do not agree, do not use the Service.

2. Eligibility

You must be at least 18 years old (or the age of majority in your jurisdiction, whichever is greater) to use the Service. By using the Service, you represent and warrant that you meet this requirement. If we learn that a User does not meet the age requirement, we will terminate their account immediately.

3. Account Registration and Security

You must provide accurate, complete, and current information when creating an account. You are solely responsible for maintaining the confidentiality of your account credentials and for all activities that occur under your account. You agree to notify us immediately of any unauthorized use of your account.

We reserve the right to suspend or terminate any account that we reasonably believe has been compromised, is being used fraudulently, or violates these Terms.

We employ cryptographic controls including token-based authorization, HKDF key derivation, and per-node encryption to protect workflow data processed through the Service. These controls operate at the platform level. You remain responsible for safeguarding your account credentials, API keys, and any secrets you store through the Service.

4. Service Limits

Your use of the Service is subject to the following usage limits per plan. We may enforce these limits to ensure fair use and system stability. Exceeding limits may result in throttling, queuing, or temporary suspension until the next reset period.

Execution credits

An "Execution Credit" means one node executed within a graph run. A single graph run may consume multiple Execution Credits, one per node executed. Partial executions, timed-out executions (including those paused for human-in-the-loop review that subsequently time out), and retried executions each consume credits in proportion to the nodes executed. Scheduled executions consume credits in the same manner as triggered executions.

  • Local: Unlimited local execution. Local execution runs entirely on your machine and does not consume Execution Credits. No cloud runtime access is included.
  • Cloud: 50,000 Execution Credits per calendar month, included in the base subscription. Additional Execution Credits consumed beyond the included 50,000 are billed at $0.002 per credit.
  • Pro: 1,000,000 Execution Credits per calendar month, included in the base subscription. Additional Execution Credits consumed beyond the included 1,000,000 are billed at $0.0015 per credit.
  • Enterprise: Custom credit allotments and overage rates as agreed in your order form.

Execution Credit balances reset at the start of each billing cycle. Unused included credits do not roll over. Overage credits are billed in arrears at the end of the billing cycle in which they were consumed.

Scrape nodes

Scrape nodes are subject to rate limits we may impose to ensure responsible use. You are solely responsible for ensuring that your use of scrape nodes complies with the terms of service, robots.txt directives, and applicable laws of any third-party website you access. You must not use scrape nodes to collect personal data in violation of applicable privacy laws.

Document processing nodes

Document processing nodes support specific file types and sizes as documented in the product. We may impose limits on file size, page count, and processing frequency.

Human-in-the-loop executions

Graphs that include human-in-the-loop review nodes will pause execution until a designated reviewer takes action. Paused executions may time out after a period we specify in the product. Timed-out executions count against your execution limits.

We may introduce additional limits (e.g. webhooks, schedules) and will communicate them in the product or via email. Limits may be increased for higher tiers or custom plans.

5. Promotional Offer (First 200 Users)

The first 200 users who sign up and accept these Terms may receive 3 months of free access to the Service (as designated by us). Eligibility is at our sole discretion. We may require a valid payment method or upgrade path after the free period. This offer is subject to availability and may be modified or withdrawn at any time without notice.

6. Payment and Billing

The Local plan is free and requires no payment method. The Cloud plan base subscription fee of $30.00 per month is billed in advance at the start of each billing cycle. All base subscription fees are non-refundable except as expressly stated in these Terms or as required by applicable law. You authorize us to charge your designated payment method for all applicable fees.

Execution Credit overages beyond the 50,000 credits included in the Cloud plan base subscription are billed in arrears at the end of the billing cycle in which they were consumed, at the rate of $0.002 per credit. We will charge overage amounts to your designated payment method at the end of each billing cycle.

The Pro plan base subscription fee of $299.00 per month is billed in advance at the start of each billing cycle. The Pro plan includes 1,000,000 Execution Credits per calendar month. Execution Credit overages beyond the included 1,000,000 credits are billed in arrears at the end of the billing cycle in which they were consumed, at the rate of $0.0015 per credit. We will charge overage amounts to your designated payment method at the end of each billing cycle.

Enterprise plan pricing and billing terms are as agreed in your order form.

If payment fails, we may suspend your access to the Service until the outstanding balance is resolved. We reserve the right to change our pricing at any time. Price changes for existing subscribers will take effect at the start of the next billing cycle following 30 days' notice.

You are responsible for all taxes associated with your use of the Service, excluding taxes on our net income.

7. Acceptable Use and Prohibited Activities

You will use the Service only in compliance with these Terms and all applicable laws, rules, and regulations. You are responsible for your data, workflows, and use of third-party integrations (including LLM providers).

You agree not to:

  • Use the Service for any unlawful purpose or to promote illegal activities.
  • Attempt to gain unauthorized access to any part of the Service, other accounts, computer systems, or networks connected to the Service.
  • Reverse engineer, decompile, disassemble, or otherwise attempt to derive the source code of the Service.
  • Interfere with or disrupt the integrity or performance of the Service or the data contained therein, including by sending viruses, overloading, flooding, spamming, or mail-bombing.
  • Use the Service to send unsolicited communications, promotions, advertisements, or spam.
  • Use automated means (bots, scrapers, crawlers) to access the Service in a manner that exceeds reasonable use or circumvents rate limits, unless such access is through the Service's official API, CLI, or integrations.
  • Resell, sublicense, or otherwise make the Service available to third parties without our prior written consent.
  • Use the Service to infringe upon or violate the intellectual property rights, privacy rights, or other rights of any third party.
  • Upload, transmit, or store any content that is unlawful, harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, or otherwise objectionable.
  • Use the Service to build a competing product or service, or to benchmark the Service without our prior written consent.
  • Create multiple accounts to circumvent plan limits, bans, or enforcement actions.
  • Use the Service to generate content that violates the acceptable use policies of any integrated LLM provider.
  • Use scrape nodes to violate any third-party terms of service, robots.txt directives, the Computer Fraud and Abuse Act (CFAA), or applicable privacy laws, or to collect personal data without lawful basis.
  • Use the Service to generate content that constitutes defamation, child sexual abuse material (CSAM), synthetic identity fraud, non-consensual deepfakes, or regulated advice (financial, medical, or legal) presented without appropriate disclaimers.
  • Use the Service for practices prohibited under the EU AI Act, including subliminal manipulation techniques, social scoring, or real-time biometric identification in publicly accessible spaces.
  • Use, export, or re-export the Service in violation of applicable export control and sanctions laws, including U.S. Export Administration Regulations (EAR) and Office of Foreign Assets Control (OFAC) sanctions. You represent that you are not located in a sanctioned country or listed on any U.S. government restricted party list, including the Specially Designated Nationals (SDN) list.

We reserve the right to investigate and take appropriate action against anyone who, in our sole discretion, violates this section, including without limitation removing offending content, suspending or terminating the account of such violators, and reporting them to law enforcement authorities.

8. Intellectual Property

The Service, including all software, designs, text, graphics, interfaces, and the selection and arrangement thereof, is owned by ByteSlice, LLC. and is protected by intellectual property laws. You may not copy, modify, distribute, sell, or lease any part of the Service or its software, nor may you reverse engineer or attempt to extract the source code of the Service, unless applicable law permits it or you have our written consent.

You retain all rights to the data and content you upload or create through the Service ("User Content"). By using the Service, you grant us a limited, non-exclusive, royalty-free license to use, process, and store your User Content solely as necessary to provide and operate the Service, including for billing, usage metering, and debugging service errors. We will not sell your User Content or use it for purposes unrelated to the Service.

We may use aggregated, anonymized metadata (such as execution counts, node type distribution, and error rates) to improve the Service. We will not use your User Content to train machine learning models.

Compiled workflow artifacts and hash-embedded authorization tokens derived from your User Content remain your property.

The Service incorporates open-source software components. A list of components and their respective licenses is available upon request.

9. Third-Party Services

The Service integrates with or relies on third-party services, including but not limited to LLM providers, cloud infrastructure, payment processors, and authentication providers. Your use of these third-party services is subject to their respective terms and privacy policies.

We are not responsible for the availability, accuracy, or content of any third-party service, nor for any damage or loss caused by your use of or reliance on any third-party service. Output generated by LLM providers through the Service may be inaccurate, incomplete, or biased, and you are solely responsible for evaluating and using such output.

The Service relies on Anvil KMS for cryptographic key management operations. You acknowledge that Anvil KMS is a critical dependency of the Service's security architecture.

You configure which LLM providers are used in your workflow definitions. Data is sent only to the providers you specify. You are responsible for reviewing and accepting the terms and privacy practices of any LLM provider you configure.

10. Data and Privacy

We collect and process personal data as described in our Privacy Policy. By using the Service, you consent to the collection and processing of your data as described therein.

You are solely responsible for ensuring that any data you upload, store, or process through the Service complies with applicable data protection laws, including but not limited to GDPR, CCPA, and any other applicable privacy regulations. You represent and warrant that you have obtained all necessary consents and authorizations to process any personal data through the Service.

To the extent you process personal data through the Service as a data controller, we will enter into a Data Processing Agreement upon request.

When third parties submit data to your workflows through forms, webhooks, or APIs, we process that data on your behalf as a data processor. You are the data controller and are responsible for ensuring that your collection and processing of such data complies with applicable law.

Upon termination of your account, you may request an export of your User Content for 30 days following termination. After this period, we will delete your data in accordance with our data retention policies. We are not obligated to retain or provide copies of your data after the 30-day export window, unless required by applicable law.

11. Security Architecture

The Service employs a cryptographic security model designed to enforce authorization and data isolation at the platform level. Key elements include:

  • Cryptographic token-based authorization with HMAC-SHA256 chained delegation across five levels (workspace, deployment, execution, node, and tool).
  • HKDF-SHA512 key derivation with zero stored key material. Keys are derived on demand and discarded after use.
  • AES-256-GCM symmetric encryption with per-node encryption contexts. Data encrypted by one node cannot be decrypted by another.
  • SHA-512 tamper-evident audit trail on append-only storage.

For a detailed technical description, see our Security page at swirls.ai/security.

The security architecture described above applies to the cloud-hosted Service. If you use the CLI for local execution or operate a self-hosted deployment, you are responsible for the security of your local or self-hosted environment.

12. Disclaimer of Warranties

The Service is provided "as is" and "as available" without warranties of any kind, whether express, implied, or statutory. To the fullest extent permitted by applicable law, we disclaim all warranties, including but not limited to implied warranties of merchantability, fitness for a particular purpose, non-infringement, and any warranties arising from course of dealing or usage of trade.

We do not warrant that the Service will be uninterrupted, error-free, secure, or free of viruses or other harmful components. We do not guarantee the accuracy, completeness, or usefulness of any content or output generated through the Service, including output from LLM providers. You use the Service at your own risk.

The security architecture described at swirls.ai/security represents our current design and operational approach. It does not constitute a warranty or guarantee of security. Our liability for security incidents is governed by Section 13.

13. Limitation of Liability

To the fullest extent permitted by applicable law, in no event shall ByteSlice, LLC., its officers, directors, employees, agents, or affiliates be liable for any indirect, incidental, special, consequential, or punitive damages, including but not limited to loss of profits, data, use, goodwill, or other intangible losses, resulting from:

  • Your access to or use of (or inability to access or use) the Service;
  • Any conduct or content of any third party on or through the Service;
  • Any content obtained from the Service, including LLM-generated output;
  • Unauthorized access, use, or alteration of your transmissions or content by third parties, provided that this exclusion does not limit our liability for security failures within our reasonable control;
  • Any bugs, viruses, or other harmful code that may be transmitted through the Service;
  • Any interruption or cessation of transmission to or from the Service.

In no event shall our total aggregate liability to you for all claims arising out of or relating to these Terms or the Service exceed the greater of (a) the amounts you have paid to us in the twelve (12) months preceding the claim, or (b) one hundred U.S. dollars ($100.00).

14. Indemnification

You agree to indemnify, defend, and hold harmless ByteSlice, LLC., its officers, directors, employees, agents, and affiliates from and against any and all claims, damages, obligations, losses, liabilities, costs, or debt, and expenses (including but not limited to attorney's fees) arising from: (a) your use of and access to the Service; (b) your violation of any term of these Terms; (c) your violation of any third-party right, including without limitation any intellectual property, privacy, or proprietary right; (d) any claim that your User Content caused damage to a third party; or (e) your violation of any applicable law, rule, or regulation.

Enterprise customers may negotiate mutual indemnification terms in their order form.

15. Termination and Suspension

We may suspend or terminate your access to the Service at any time, with or without cause, and with or without notice, at our sole discretion. Without limiting the foregoing, we may suspend or terminate your account if we reasonably believe that:

  • You have violated these Terms or any applicable law;
  • You have engaged in activity that may create liability for us or other users;
  • Your account has been flagged for unusual or abusive activity;
  • Your use of the Service poses a security risk or may adversely impact the Service or other users;
  • Your account is being used for fraudulent purposes or by an unauthorized party.

You may terminate your account at any time by contacting us. Upon termination, your right to use the Service will cease immediately.

For termination without cause by us: Local accounts may be terminated at any time without advance notice. Cloud and Pro accounts will receive 30 days' advance notice. Enterprise account termination terms are governed by the applicable order form.

All provisions of these Terms which by their nature should survive termination shall survive, including without limitation ownership provisions, warranty disclaimers, indemnification, and limitations of liability.

16. Service Availability

We do not guarantee any specific uptime or availability of the Service. The Service may be subject to scheduled or unscheduled downtime for maintenance, updates, or other reasons. We will make commercially reasonable efforts to provide advance notice of scheduled downtime but are not obligated to do so. We are not liable for any loss or damage arising from service interruptions.

Uptime commitments, if any, are defined in your plan or order form. See our published SLA for details.

17. Governing Law and Dispute Resolution

These Terms shall be governed by and construed in accordance with the laws of the State of Delaware, United States, without regard to its conflict-of-law provisions.

Any dispute arising out of or relating to these Terms or the Service shall first be attempted to be resolved through good-faith negotiation. If the dispute cannot be resolved through negotiation within thirty (30) days, either party may submit the dispute to binding arbitration administered by the American Arbitration Association (AAA) in accordance with its Commercial Arbitration Rules. The arbitration shall be conducted in the State of Delaware, and judgment on the award may be entered in any court of competent jurisdiction.

You agree that any dispute resolution proceedings will be conducted only on an individual basis and not in a class, consolidated, or representative action. You waive any right to participate in a class action lawsuit or class-wide arbitration against ByteSlice, LLC., to the extent permitted by applicable law.

Notwithstanding the foregoing, either party may seek injunctive or other equitable relief in any court of competent jurisdiction to prevent the actual or threatened infringement, misappropriation, or violation of intellectual property rights.

18. Changes to These Terms

We may update these Terms and the limits above at any time. We will notify you of material changes by email or through the Service at least thirty (30) days before the changes take effect. Continued use of the Service after the effective date constitutes acceptance of the updated Terms. If you do not agree with the changes, you must stop using the Service and terminate your account before the effective date.

19. General Provisions

Entire Agreement. These Terms, together with our Privacy Policy and any applicable order forms, constitute the entire agreement between you and ByteSlice, LLC. regarding the Service and supersede all prior agreements and understandings.

Severability. If any provision of these Terms is found to be unenforceable or invalid, that provision shall be limited or eliminated to the minimum extent necessary so that these Terms shall otherwise remain in full force and effect.

Waiver. No waiver of any term of these Terms shall be deemed a further or continuing waiver of such term or any other term. Our failure to assert any right or provision under these Terms shall not constitute a waiver of such right or provision.

Assignment. You may not assign or transfer these Terms or your rights hereunder, in whole or in part, without our prior written consent. We may assign these Terms without restriction.

Force Majeure. We shall not be liable for any delay or failure to perform resulting from causes outside our reasonable control, including but not limited to acts of God, war, terrorism, pandemics, natural disasters, power failures, internet disturbances, government actions, or third-party service failures.

20. CLI and Local Execution

The "Service" as used in these Terms includes the Swirls command-line interface (CLI) tool. When you use the CLI, it communicates with Swirls servers to authenticate your session and transmit usage telemetry (such as command invocations, execution counts, and error reports). The CLI does not transmit the contents of your workflow data to our servers except as necessary to execute cloud-hosted operations you initiate.

The security controls described in Section 11 apply to cloud-hosted execution. You are responsible for the security of your local execution environment, including operating system updates, file system permissions, and network configuration.

21. Self-Hosted Deployment

Self-hosted deployment of the Service is available under the Enterprise plan pursuant to a separate software license agreement. We provide no warranty, uptime commitment, or support for self-hosted deployments unless expressly stated in your order form.

In a self-hosted deployment, you are solely responsible for encryption at rest, key management, audit log integrity, and all other aspects of infrastructure security. The security architecture described in Section 11 describes our cloud-hosted implementation. Your self-hosted environment may differ.

22. Human-in-the-Loop Review

The Service provides a human-in-the-loop review feature that allows designated personnel to review and approve actions within a workflow before they are executed. Review decisions are made solely by personnel you designate. We provide the interface but exercise no discretion over review decisions.

You are solely responsible for the consequences of decisions made by your designated reviewers, including any actions taken or not taken as a result of the review process.

23. Contact

Questions about these Terms or the Service? Contact us at byteslice.co/contact.

For security inquiries and vulnerability reports, contact [email protected].

For privacy and data protection inquiries, including GDPR and CCPA rights requests, contact [email protected].

24. Vulnerability Disclosure

If you discover a security vulnerability in the Service, please report it to [email protected]. We commit to acknowledging vulnerability reports within 48 hours.

We provide safe harbor for good-faith security researchers. If you conduct security research in compliance with this section, we will not pursue legal action against you or refer your activity to law enforcement. Good-faith security research means: accessing only your own accounts and data, making reasonable efforts to avoid disruption to other users, and reporting findings promptly.

Security research conducted in good faith under this section is exempt from the prohibitions on unauthorized access in Section 7.

← Back to home