1. You may not use the application outside of its intended use, such as (but not limited to) exploiting unintended bugs found in the application.

  2. You may not intentionally abuse the application, such as (but not limited to) spamming commands.