Legal

Terms of Service

Last updated: May 2026  ·  Sagitta Continuity Engine

By requesting a Defense Review, accessing the SCE portal, or engaging with Sagitta Continuity Engine in any capacity, you agree to the following terms. Please read them carefully.

Scope of service

Sagitta Continuity Engine provides public-surface continuity intelligence, authority-risk review, control recommendations, verification tracking, and Defense Review reports for Web3 protocols, DAOs, and related systems. All reviews are conducted using publicly accessible data and information explicitly provided by the client. SCE does not take custody of keys, funds, contracts, wallets, treasury assets, or protocol authority.

Zero-custody commitment

SCE will never request private keys, seed phrases, signing credentials, multisig access, wallet control, contract ownership, upgrade authority, or any form of custody or control over protocol contracts, wallets, or treasury assets. Any communication claiming to represent SCE and requesting such access should be treated as fraudulent and reported immediately to hello@sagitta.systems.

Client responsibilities

Clients are responsible for providing accurate, complete, and current information for review, including contract addresses, chain/network details, documentation links, repository links, governance information, admin/multisig/timelock evidence, and other relevant materials. Clients remain solely responsible for evaluating, implementing, and maintaining any controls, remediations, governance actions, or operational changes recommended by SCE.

Public-surface review only

Defense Reviews are public-surface reviews unless a separate written agreement states otherwise. SCE reviews public metadata, public blockchain data, public documentation, and operator-provided evidence. SCE does not access private systems, private repositories, internal infrastructure, signing systems, wallets, or non-public operational environments unless separately agreed in writing.

No guarantee of completeness

Defense Review reports are based on publicly available data and operator-provided evidence at the time of review. SCE does not warrant that any review is exhaustive or that it identifies all vulnerabilities, risks, misconfigurations, governance issues, authority paths, or continuity gaps present in a protocol. Reviews reflect a point-in-time assessment. Protocol state changes after delivery are not covered unless included in a new or continuing engagement.

Control verification and "Defended" status

A control may be marked verified only when sufficient evidence has been provided or observed through public sources, as determined by SCE's review process. "Defended" status applies only to controls that have been verified against submitted evidence or publicly accessible data. It does not mean the protocol is immune from attack, free of risk, fully audited, or guaranteed safe. SCE may rely on the accuracy of client-provided evidence. If submitted evidence is inaccurate, incomplete, outdated, or misleading, related findings, controls, verification status, or reports may also be affected.

No emergency response guarantee

Unless separately agreed in writing, SCE Defense Review services do not constitute 24/7 monitoring, managed security services, emergency incident response, exploit recovery, transaction execution, or operational control. SCE may help identify authority risks, continuity gaps, evidence requirements, recommended controls, and response considerations, but clients remain responsible for executing their own operational, governance, security, and legal responses.

No professional advice

SCE reports and outputs are informational and operational in nature. They do not constitute legal, financial, investment, insurance, compliance, or formal security audit advice. Clients should consult qualified legal, financial, compliance, cybersecurity, smart contract audit, or other professional advisors before relying on SCE outputs for regulated, financial, or high-risk decisions.

Limitation of liability

To the maximum extent permitted by law, SCE and Sagitta are not liable for losses, exploits, incidents, vulnerabilities, governance failures, smart contract failures, oracle failures, treasury losses, market losses, operational disruptions, or third-party actions that occur before, during, or after a review engagement. Use of SCE outputs does not transfer risk to SCE and does not establish any guarantee of protocol safety, continuity, solvency, or performance.

Permitted use

Defense Review reports and SCE outputs may be used internally by the client for audit readiness, grant applications, investor diligence, partner diligence, operational planning, governance preparation, and control tracking. Redistribution, publication, quotation, or public use of SCE reports, screenshots, findings, ratings, marks, or branding requires prior written approval from Sagitta unless expressly permitted in the engagement terms.

Confidentiality of reports

SCE will not intentionally publish client Defense Review reports without permission. Clients are responsible for controlling distribution of reports once delivered to them. Public protocol data may still appear in SCE's general public-surface intelligence systems, case library, threat-family mapping, or research outputs, provided client-specific private communications or non-public submitted materials are not disclosed without permission.

Fees and engagement terms

Fees, scope, delivery timelines, covered assets, and review limits are determined by the applicable proposal, invoice, written agreement, or service description. The Starter Defense Review covers up to 5 public contracts or assets unless otherwise agreed. Larger protocols, multi-chain systems, evidence-heavy reviews, or follow-up verification work may require custom scope and pricing.

Changes to terms

These terms may be updated from time to time. Continued use of SCE services after an update constitutes acceptance of the revised terms. Questions about these terms can be directed to hello@sagitta.systems.

← Back to home
PrivacyStatus