Terms of Service
Effective Date: February 2026
01 //Access & Infrastructure Authorization
By traversing, querying, or otherwise interacting with this digital portfolio, you explicitly acknowledge and agree to abide by these established operational protocols. This node serves as a professional portfolio deliberately designed to demonstrate advanced, senior-level capabilities in DevSecOps architecture, Penetration Testing, and Artificial Intelligence Defense mechanisms.
Unauthorized extraction, systematic scraping, automated directory traversal, or malicious mirroring of the underlying architecture, frontend assets, or API endpoints is strictly prohibited and actively monitored.
02 //Intellectual Property & Source Code
All original source code representations, architectural infrastructure designs, custom cryptographic algorithms, aesthetic UI/UX choices, and textual content synthesized within this domain are the exclusive intellectual property of Salah Abdullah, unless otherwise explicitly stated or directly originating from properly attributed open-source libraries.
Reproduction, syndication, or commercial adaptation of these assets without explicit cryptographic or written authorization is not permitted under international copyright and intellectual property frameworks.
03 //Liability & Operational Warranties
This repository of professional work and theoretical implementation is provisioned on an strictly "AS-IS" and "AS-AVAILABLE" basis. I do not provision warranties, express or implied, regarding uninterrupted operational capability, continuous API availability, or absolute exemption from digital artifacts, glitches, or localized rendering anomalies.
The site operator and engineer shall not, under any circumstances, be held legally or financially liable for compensatory, incidental, direct, or consequential damages arising from the use, interpretation, or inability to access this localized node.
04 //Security Posture & Rules of Engagement
As a recognized tenet within the cybersecurity community, if you discover an exploitable vulnerability, misconfiguration, or logical flaw within this portfolio's infrastructure, I strictly request your adherence to responsible disclosure frameworks. Execute communications detailing the vulnerability to the primary contact vectors rather than pursuing public disclosure or exploitation.
Passive reconnaissance and non-intrusive mapping are expected operational behaviors; however, active weaponized payloads targeting this domain without prior authorization constitute a severe violation of these terms and standard ethical hacking protocols.

