Cohere · Cohere Responsible Use Policy · View original document ↗

Prohibited Use: Cyberweapons and Critical Infrastructure Attacks

High severity Medium confidence Explicitdocumentlanguage Unique · 0 of 325 platforms
Share 𝕏 Share in Share 🔒 PDF
Monitor governance changes for Cohere Create a free account to receive the weekly governance digest and monitor one platform for governance changes.
Create free account No credit card required.
Document Record

What it is

The policy prohibits using Cohere's AI to write malware, cyberweapons, or attack tools, and to plan or execute attacks against critical infrastructure such as power grids, water systems, or financial networks.

This analysis describes what Cohere's agreement states, permits, or reserves. It does not constitute a legal determination about enforceability. Regulatory applicability and practical outcomes may vary by jurisdiction, enforcement context, and individual circumstances. Read our methodology

ConductAtlas Analysis

Why it matters (compliance & governance perspective)

This provision covers both the creation of offensive tools and their potential deployment against critical infrastructure, meaning operators in cybersecurity contexts must assess whether legitimate security research or penetration testing use cases could be construed as prohibited.

Interpretive note: The boundary between permitted security research and prohibited cyberweapon creation is not defined in the document and may require case-by-case assessment.

Consumer impact (what this means for users)

Operators and users cannot use Cohere's services to generate functional malicious code or to support cyberattacks, including against critical infrastructure, regardless of stated research or testing justifications unless those use cases are separately authorized.

Cross-platform context

See how other platforms handle Prohibited Use: Cyberweapons and Critical Infrastructure Attacks and similar clauses.

Compare across platforms →

Monitoring

Cohere has changed this document before.

Receive same-day alerts, structured change summaries, and monitoring for up to 10 platforms.

Start Watcher free trial Or create a free account →
▸ View Original Clause Language DOCUMENT RECORD
"
Do not use Cohere's services to create cyberweapons or malicious code that could cause significant damage if deployed, or to conduct attacks on critical infrastructure.

— Excerpt from Cohere's Cohere Responsible Use Policy

ConductAtlas Analysis

Institutional analysis (Compliance & governance intelligence)

REGULATORY LANDSCAPE: This provision engages the US Computer Fraud and Abuse Act (CFAA), the EU's Directive on Attacks Against Information Systems (2013/40/EU), the UK Computer Misuse Act, and critical infrastructure protection frameworks such as CISA regulations. The EU AI Act also addresses AI use in contexts that could affect critical infrastructure. GOVERNANCE EXPOSURE: High for cybersecurity firms, penetration testing providers, and security researchers who use AI to assist with offensive security work. The boundary between authorized penetration testing and prohibited cyberweapon creation requires careful operational definition. JURISDICTION FLAGS: The US, EU, and UK all impose criminal liability for unauthorized computer access and cyberweapon deployment. Organizations providing cybersecurity services internationally face multi-jurisdictional exposure. US government contractors may face additional obligations under FISMA and sector-specific cybersecurity frameworks. CONTRACT AND VENDOR IMPLICATIONS: Cybersecurity vendors and managed security service providers using the Cohere API should assess whether their authorized offensive security use cases require specific permissions or carve-outs from Cohere. B2B agreements should address the boundary between permitted security research and prohibited cyberweapon creation. COMPLIANCE CONSIDERATIONS: Operators in the cybersecurity sector should document the distinction between their authorized use cases and the prohibited categories in this provision, implement controls to prevent generation of deployable malicious code, and consider whether their terms of service adequately restrict downstream misuse by their own users.

Full compliance analysis

Regulatory citations, enforcement risk, and due diligence action items.

Track 1 platform — free Try Watcher free for 14 days

Free: track 1 platform + weekly digest. Watcher: 10 platforms + same-day alerts. No credit card required.

Applicable agencies

  • FTC
    The FTC has jurisdiction over platform operators that fail to implement reasonable security practices, including those enabling cyberattack tools
    File a complaint →

Provision details

Document information
Document
Cohere Responsible Use Policy
Entity
Cohere
Document last updated
May 12, 2026
Tracking information
First tracked
May 12, 2026
Last verified
May 12, 2026
Record ID
CA-P-011992
Document ID
CA-D-00830
Evidence Provenance
Source URL
Wayback Machine
Content hash (SHA-256)
525a1023544d802d0b69aead1ed2f42d817072b058c572837c434d0b14e12fa2
Analysis generated
May 12, 2026 16:53 UTC
Methodology
Evidence
✓ Snapshot stored   ✓ Hash verified
Citation Record
Entity: Cohere
Document: Cohere Responsible Use Policy
Record ID: CA-P-011992
Captured: 2026-05-12 16:53:50 UTC
SHA-256: 525a1023544d802d…
URL: https://conductatlas.com/platform/cohere/cohere-responsible-use-policy/prohibited-use-cyberweapons-and-critical-infrastructure-attacks/
Accessed: May 13, 2026
Permanent archival reference. Stable identifier suitable for legal filings, compliance documentation, and research citation.
Classification
Severity
High
Categories

Other risks in this policy

Professional Governance Intelligence

Need to monitor specific governance provisions?

Professional includes provision-level monitoring, governance timelines, regulatory mapping, and audit-ready analysis.

Arbitration clauses AI governance Data rights Indemnification Retention policies
Start Professional free trial

Or start with Watcher →

Built from archived source documents, structured governance mappings, and historical version tracking.

Frequently Asked Questions

What does Cohere's Prohibited Use: Cyberweapons and Critical Infrastructure Attacks clause do?

This provision covers both the creation of offensive tools and their potential deployment against critical infrastructure, meaning operators in cybersecurity contexts must assess whether legitimate security research or penetration testing use cases could be construed as prohibited.

How does this clause affect you?

Operators and users cannot use Cohere's services to generate functional malicious code or to support cyberattacks, including against critical infrastructure, regardless of stated research or testing justifications unless those use cases are separately authorized.

Is ConductAtlas affiliated with Cohere?

No. ConductAtlas is an independent monitoring service. We are not affiliated with, endorsed by, or sponsored by Cohere.