Prohibited Uses
Content-Related Violations
Malicious Code
Strictly prohibited:
- Malware, ransomware, or spyware
- Backdoors or security exploits
- Code designed to harm or surveil users
- Cryptojacking or resource hijacking scripts
Harmful Content
Strictly prohibited:
- Sexually explicit material or pornography
- Content sexualizing minors in any form
- Promotion of violence, terrorism, or self-harm
- Hate speech or discriminatory content
Illegal Material
Strictly prohibited:
- Illegal weapons manufacturing instructions
- Drug trafficking or distribution facilitation
- Stolen intellectual property
- Trade secret violations
Harassment & Abuse
Strictly prohibited:
- Targeted harassment or doxxing
- Defamation or impersonation
- Coordinated abuse campaigns
- Spam or automated flooding
Operational & Technical Abuse
Security Circumvention
Security Circumvention
You may NOT use gitGost to:
- Bypass repository access controls or permissions
- Evade bans or moderation actions
- Circumvent rate limits through automated tools
- Exploit vulnerabilities in target repositories
- Use gitGost infrastructure for penetration testing
Fraud & Social Engineering
Fraud & Social Engineering
Automated Abuse
Automated Abuse
You may NOT use gitGost with:
- Bots or automated PR generation scripts
- Repository scrapers or spam tools
- Coordinated flooding campaigns
- Distributed abuse across multiple IPs
Legal & Ethical Violations
Abuse Prevention Measures
gitGost implements multiple layers of protection against misuse:Rate Limiting
Per-IP Limits
5 PRs per IP per hourPrevents spam flooding while allowing legitimate rapid contributions. Resets hourly.
Size Constraints
Repository Size
Maximum: 500 MBPrevents abuse of gitGost for hosting large datasets or binaries.
Commit Size
Maximum: 10 MBBalances legitimate contributions with Tor network compatibility.
Validation & Sanitization
Git Object Validation
Git Object Validation
Every push is validated for:
- Valid Git refs: Ensures proper branch/tag formatting
- Object integrity: Checks for corrupted or malformed Git objects
- Commit structure: Validates author/committer fields are properly stripped
- Repository accessibility: Confirms target repo exists and accepts PRs
Metadata Stripping
Metadata Stripping
gitGost automatically removes:
- Author name and email from commits
- Committer name and email
- Original timestamps (replaced with current time)
- GPG signatures and signed commits
- Custom Git headers and trailers
@gitgost-anonymous bot account.Emergency Response
Panic Mode
If abusive activity is detected, administrators can:
- Suspend the service immediately (all pushes rejected)
- Close recent PRs in bulk (2-hour rollback window)
- Block contribution hashes from future submissions
- Display public warnings on the service website
Consequences of Abuse
Immediate Actions
- Hash Blocking: The commit hash is permanently blocked from making future submissions
- Rate Limit Enforcement: IP-based throttling prevents rapid retry attempts
- PR Rejection: The malicious PR is immediately closed or never created
Escalation Path
DMCA & Intellectual Property Claims
Reporting IP Infringement
Reporting IP Infringement
If you believe content submitted through gitGost infringes your intellectual property:Contact:
[email protected] with subject [DMCA] or [IP-CLAIM]Include:- Identification of your copyrighted work
- PR URL, commit hash, or repository link
- Your contact information
- Good-faith statement and declaration under penalty of perjury
- Acknowledgment within 5 business days
- Action taken within 10 business days
What Makes a Contribution Appropriate?
Good vs. Bad Anonymity
| ✅ Appropriate Use | ❌ Inappropriate Use |
|---|---|
| Fixing typos without public record | Submitting spam PRs |
| Contributing despite employer restrictions | Evading repository bans |
| Protecting identity in hostile jurisdiction | Harassing maintainers |
| Experimenting without social pressure | Injecting malicious code |
| Avoiding email harvesting | Circumventing contribution agreements |
Reporting Abuse
If you observe abusive use of gitGost:Email Report
Email:
Subject:
[email protected]Subject:
[ABUSE]Include PR URL, repository, and description of abuse.Anonymous Report
GitHub Issue: Open with prefix
[LEGAL] or [ABUSE]Reports can be made anonymously through throwaway accounts.Why These Rules Exist
Protecting the Service
gitGost exists to serve legitimate privacy needs, not to enable harm. Strict abuse prevention:
- Keeps the service operational for those who need it
- Prevents legal liability for the project maintainers
- Maintains trust with repository maintainers and the GitHub platform
- Ensures gitGost doesn’t become a vector for coordinated attacks
Legitimate Uses
Learn when gitGost is the right tool for your contribution