Senteron logo Senteron

Privacy & data handling

What the Senteron MCP extension touches on your computer, what leaves your computer, and what it never does. Plain English, no dark patterns.

Short version. Senteron reads its own repository folder, writes run artifacts back to that folder, and makes outbound HTTPS calls only to the LLM providers whose API keys you've configured. No analytics. No telemetry. No third-party tracking.

What Senteron reads on your computer

What Senteron writes on your computer

What leaves your computer

Senteron makes outbound HTTPS requests to the LLM provider endpoints whose API keys are present in your .env file. Typical destinations include:

Each provider has its own privacy and data-retention policy that applies to the prompts and responses you send through them. Senteron does not modify, intercept, or proxy any of those calls — it dispatches directly to the provider SDKs.

API keys

API keys live in your local .env file. The MCP extension loads them when spawning senteron.py, but it does not transmit them anywhere except to the LLM providers themselves over HTTPS. The keys are never logged, never written to runs/ artifacts, and never sent to the host of this website.

Stderr output returned to the MCP client is best-effort scrubbed for common API-key patterns (sk-…, AKIA…, AIza…) before being shown.

What Senteron does not do

Verifying for yourself

The full source is at github.com/senteron/senteron under the MIT license. The relevant files for the claims above:

Reporting concerns

If you find a privacy or security issue, please open a private security advisory on the GitHub repository rather than a public issue.

Last updated: 2026-05-22. Policy may change with releases; the authoritative version is the one served at this URL.