Prohibited Items
Effective Date: March 18, 2026
Illegal Assets
The following clearly illegal digital items are prohibited on ZipRio. Listings containing these items may be removed without notice, and related accounts may be suspended or terminated.
- Counterfeit or forged documents: fake IDs, forged certificates, forged compliance docs, fake invoices, or other falsified records used for fraud.
- Credential access tools or stolen access material: phishing kits, stolen cookies/tokens, account takeover tooling, credential stuffing packs, or similar unauthorized access tools.
- Personal data and doxxing datasets: unlawfully obtained or distributed PII, including SSNs, passport details, financial records, medical records, and exposed personal contact datasets.
- Child sexual abuse material (CSAM): any content depicting or facilitating child sexual exploitation.
- Illicit drug trafficking content: materials primarily intended to facilitate illegal drug manufacture, sale, or distribution.
- Spam and fraud automation kits: tools or datasets for ad fraud, fake review farms, robocall/SMS spam campaigns, or related financial fraud.
- Malware and malicious code: viruses, trojans, ransomware, spyware, keyloggers, botnet clients, droppers, backdoors, cryptominers, credential stealers, exploits, or code intended to compromise systems or data.
- Unauthorized copyrighted media: unlicensed or pirated copies of books, ebooks, audiobooks, music, movies, TV content, podcasts, stock media, fonts, templates, or other protected works.
- Unauthorized software and games: cracked, pirated, reverse-engineered, leaked, or otherwise unauthorized copies of software, plugins, apps, firmware, video games, game assets, or game source code.
- OEM, volume-license, and bundled software resale: keys, installers, images, or packages from OEM, educational, NFR, trial, or bundled distributions where resale or transfer is not expressly authorized by the rights holder.
- License-key abuse tools: key generators, license bypass tools, activation cracks, DRM circumvention tools, or instructions primarily designed to defeat licensing controls.
- Stolen or leaked data/content: databases, source code leaks, private repositories, internal docs, or any data/content obtained without lawful authorization.
If you believe a listing violates this policy, report it through the Help page.