🛡 Security Policy

Responsible use, access controls, and reporting.

Responsible use required. This tool is provided for legitimate insurance research and product age verification purposes only. Automated access, scraping, and abuse are prohibited.

Permitted Use

Bolt is designed to assist insurance professionals, adjusters, and property owners in researching product manufacture dates and estimated replacement values. All use of this tool must be manual, in good faith, and consistent with its intended purpose.

You may use Bolt to look up individual items as part of a legitimate insurance claim, appraisal, or research workflow.

Prohibited Activities

The following activities are strictly prohibited:

  • Automated scraping — using bots, scripts, crawlers, or any automated method to extract data from this site in bulk.
  • API abuse — sending high-volume, programmatic, or repeated requests in a manner that circumvents normal use or degrades service for others.
  • Reverse engineering — attempting to extract, copy, or replicate the underlying serial number database, AI prompts, or proprietary logic.
  • Unauthorized access — attempting to access server infrastructure, backend APIs, or administrative systems beyond what is publicly exposed.
  • Misrepresentation — presenting tool output as a certified appraisal, official manufacturer record, or professional opinion without independent verification.

Rate Limiting and Access Controls

Bolt implements server-side rate limiting on all API endpoints. Excessive or abusive request patterns may result in temporary or permanent access restrictions without prior notice. These controls exist to protect service availability for all legitimate users.

Third-Party Infrastructure

Bolt runs on Vercel's hosting infrastructure and uses Google's Gemini AI API and Upstash Redis for caching. Security of those services is governed by their respective providers. Bolt does not store credentials, payment information, or sensitive personal data on its own servers.

Reporting a Security Issue

If you discover a security vulnerability, data exposure, or behavior that appears unintended, please report it responsibly using our contact form. Include a clear description of the issue and steps to reproduce it. We will investigate and respond promptly. Please do not publicly disclose vulnerabilities before we have had an opportunity to address them.

Informational Purposes Only

All results produced by this tool are for informational purposes only. They do not constitute certified appraisals, legal opinions, or manufacturer-verified records. Users are responsible for independently verifying any result before relying on it in a formal context.