Updated on Sep 21, 2025

Updated on Sep 21, 2025

Terms of use

By using Heist, you agree to these Terms of Use. Please read them carefully.

By using Heist, you agree to these Terms of Use. Please read them carefully.

Overview

Heist is an automated penetration testing platform that helps users identify security vulnerabilities in their web applications and APIs. We provide AI-powered security testing agents that discover, test, and validate potential security issues. We do not provide direct security consulting or remediation services.

Heist is an automated penetration testing platform that helps users identify security vulnerabilities in their web applications and APIs. We provide AI-powered security testing agents that discover, test, and validate potential security issues. We do not provide direct security consulting or remediation services.

Eligibility

To use Heist, you must:

  • You must not be building or working at a competing service, or plan to use access to extract information.

  • Use the service only on applications you own or have explicit authorization to test.

To use Heist, you must:

  • You must not be building or working at a competing service, or plan to use access to extract information.

  • Use the service only on applications you own or have explicit authorization to test.

Account responsibilities

You are responsible for:

  • Maintaining the security of your login credentials.

  • Ensuring you have proper authorization to test the applications and systems you submit.

  • Using the service according to the law and these terms.

You are responsible for:

  • Maintaining the security of your login credentials.

  • Ensuring you have proper authorization to test the applications and systems you submit.

  • Using the service according to the law and these terms.

Acceptable use

You agree not to:

  • Use Heist to test applications or systems without proper authorization.

  • Use Heist for unlawful, malicious, or harmful purposes.

  • Attempt to access or alter other users' data or test results.

You agree not to:

  • Use Heist to test applications or systems without proper authorization.

  • Use Heist for unlawful, malicious, or harmful purposes.

  • Attempt to access or alter other users' data or test results.

Intellectual property

All content and materials on Heist (including logos, design, code, and testing methodologies) are owned by Heist or our licensors. You may not reuse or redistribute them without permission.

Heist reserves the right to use the logo of all domains and associated companies registered for our service in our marketing.

All content and materials on Heist (including logos, design, code, and testing methodologies) are owned by Heist or our licensors. You may not reuse or redistribute them without permission.

Heist reserves the right to use the logo of all domains and associated companies registered for our service in our marketing.

Limitation of liability

Heist provides automated security testing tools based on your application data. We are not responsible for any security breaches, data losses, or damages that may occur during or after testing. Our service identifies potential vulnerabilities but does not guarantee complete security coverage. Use Heist at your own risk.

Heist provides automated security testing tools based on your application data. We are not responsible for any security breaches, data losses, or damages that may occur during or after testing. Our service identifies potential vulnerabilities but does not guarantee complete security coverage. Use Heist at your own risk.

Termination

We reserve the right to suspend or terminate your access to Heist if you violate these terms or use the service for unauthorized testing.

We reserve the right to suspend or terminate your access to Heist if you violate these terms or use the service for unauthorized testing.

Changes to terms

We may update these Terms occasionally. Continued use of Heist means you accept any updated terms.

We may update these Terms occasionally. Continued use of Heist means you accept any updated terms.

Contact

For questions or legal concerns, reach us at legal[at]heisthq.com

For questions or legal concerns, reach us at legal[at]heisthq.com

Get ahead of your vulnerabilities. Run your pentests with Heist.

Get ahead of your vulnerabilities. Run your pentests with Heist.

Get ahead of your vulnerabilities. Run your pentests with Heist.