Terms of Service
Last updated: March 10, 2026
TL;DR: Use at Your Own Risk
CSV GPT is an in-browser tool provided "as is". We don't control the AI models, we don't store your data, and we cannot guarantee the complete accuracy of generated SQL or insights. Always double-check critical analytical results.
1. Acceptance of Terms
By accessing and using CSV GPT, you acknowledge that you have read, understood, and agree to be bound by these Terms of Service. If you do not agree with any part of these terms, please do not use the application.
2. Description of Service
CSV GPT provides an in-browser interface for analyzing CSV files using third-party or local Large Language Models (LLMs). The application translates your natural language queries into SQL, executes them against your locally-loaded data, and may generate visualizations.
3. No Warranty ("As Is")
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
- AI Accuracy: The AI integration is probabilistic and can hallucinate or write incorrect SQL. We are not responsible for business decisions made based on CSV GPT's output.
- Data Loss: Since data is stored in browser memory or local storage, it can be lost upon browser refresh or clearing cache. We cannot restore lost data.
4. Third-Party LLM Providers
Users who connect third-party APIs (e.g., OpenAI) are responsible for complying with that provider's Terms of Service, including acceptable use policies and API costs incurred by submitting requests through CSV GPT.
5. User Guidelines
While CSV GPT operates locally, you agree not to use the application to attempt unauthorized reverse engineering of connected APIs, distribute malicious code, or engage in activities that intentionally abuse rate limits of connected third-party platforms.