fix: harden privacy boundaries and release trust#1
Open
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
This PR hardens
goop-faceacross three trust-critical areas:The goal is simple: make the public contract honest, make the MCP surface safer, and make first-run/install behavior trustworthy.
Why this matters
Projects in the privacy/safety space get judged on trust first.
Before this patch set:
goop-face-mcpcould fail with an avoidable dependency traceback.This PR fixes those issues directly and publicly. It establishes a clear baseline for how
goop-facehandles:What changed
1) Privacy/data-flow clarity
2) MCP boundary hardening
input_roots/output_rootsconfiguration in MCP config.3) Install / release trust
goop-face-mcpentrypoint degrade gracefully when the optionalmcpdependency is not installed.Validation
Targeted validation run on the combined patch set:
tests/test_client.pytests/test_mcp/test_server.pytests/test_mcp_entrypoint.pyResult:
Notes
This PR intentionally does not claim that server-tier privacy is fully solved. Instead, it does the right first thing:
That gives the project a truthful foundation for future work such as crop-only server uploads or stronger privacy-preserving backend flows.
Precedence / intent
I wanted this patch set recorded publicly and clearly because trust hardening should have provenance.
This PR establishes an explicit community record that the project’s next serious step was:
before broader promotion.