1. Web3 Security Services Disclaimer

EtherAuthority team has analyzed this smart contract (and any other software code) in accordance with the best industry practices and best of audit team’s expertise, in relation to: cybersecurity vulnerabilities and issues in smart contract source code (and any other software code), the details of which are disclosed in the audit report, (Source Code); the Source Code compilation, deployment and functionality (performing the intended functions). Due to the fact that the total number of test cases are unlimited, so the audit makes no statements or warranties on security of the code. It also cannot be considered as a sufficient assessment regarding the utility and safety of the code, bugfree status or any other statements of the contract. While we have done our best in conducting the analysis and producing this report, it is important to note that you should not rely on this report only. We also suggest to conduct a bug bounty program to confirm the high level of security of this smart contract. Smart contracts are deployed and executed on blockchain platform. The platform, its programming language, and other software related to the smart contract can have their own vulnerabilities that can lead to hacks. Thus, the audit can’t guarantee explicit security of the audited smart contracts. While our cybersecurity auditing services are designed to identify and help mitigate vulnerabilities and security risks, we cannot guarantee the absolute security of your systems. The identification of vulnerabilities is based on the current state of technology and the information provided at the time of the audit. Security threats evolve constantly, and new vulnerabilities may emerge after the completion of our audit.

2. Software Development Disclaimer:
The software we develop is provided “as is” and “as available” without any warranties or guarantees of any kind, either express or implied. We disclaim all warranties, including but not limited to, implied warranties of merchantability, fitness for a particular purpose, and non-infringement. We do not warrant that the software will be error-free, secure, or that any defects will be corrected.

3. No Guarantee of Absolute Security:
While our software development services aim to create secure and reliable software, we cannot guarantee the absolute security or flawless operation of the software we develop. The security and performance of software depend on various factors, including user environment and usage patterns.

4. Software Performance and Compatibility:
We do not warrant that the software we develop will meet all of the client’s requirements, operate without interruption, achieve the intended results, or be compatible with all systems or other software. The client is responsible for thoroughly testing the software in their environment.

5. No Liability for Indirect Damages:
We are not liable for any indirect, incidental, consequential, or special damages, including but not limited to loss of profits, revenue, data, or use, incurred by the client as a result of using our software.

6. Client Responsibilities:
The client is responsible for maintaining and securing the software we develop. Failure to follow best security practices can result in security breaches or operational issues, for which we cannot be held liable.
Clients are solely responsible for the security of their private keys and any other sensitive information. We disclaim any liability for loss of data or financial losses resulting from the failure to secure such information. By using our services, users agree to indemnify and hold us harmless from any claims or damages arising from their failure to maintain the security of their data.

7. No Legal or Regulatory Compliance Guarantee:
Our software development services are not a substitute for legal or regulatory compliance requirements. While our software may help in achieving certain standards, we do not guarantee compliance with any specific laws, regulations, or industry standards. Clients should seek appropriate legal or regulatory advice to ensure compliance.

8. Confidentiality and Data Protection:
We commit to maintaining the confidentiality of all client data accessed during the development process. However, the client must ensure that all sensitive information shared with us is adequately protected. We are not responsible for any data breaches or leaks that occur outside our control or prior to our involvement.

9. Time-Limited Validity of Software:
The performance and security of our software are based on the state of technology at the time of development. Due to the dynamic nature of cybersecurity threats and technological advancements, the validity and security of our software may diminish over time. Regular updates and security assessments are essential to maintain software security.

10. Indemnification:
The client agrees to indemnify and hold our company harmless from any claims, damages, or expenses, including legal fees, arising out of the client’s use of our software or any breach of this disclaimer.

11. Governing Law:
This disclaimer and any disputes arising out of or related to our software consultancy services shall be governed by and construed in accordance with the laws of India.

By using our software consultancy services, you acknowledge and agree to the terms outlined in this disclaimer (Implied Consent). If you have any questions or concerns regarding this disclaimer, please contact us for clarification before proceeding with our services.