This MCP server requires significant access to your Google account data. Before using this server, please understand the scope of access and potential security implications.
When you authorize this server, it requests the following OAuth2 scopes:
https://www.googleapis.com/auth/spreadsheets- Full access to Google Sheetshttps://www.googleapis.com/auth/drive.readonly- Read access to Google Drive fileshttps://www.googleapis.com/auth/drive.file- Access to files created by this application
Google Sheets:
- Read all content from any Google Sheet in your Drive
- Create new Google Sheets documents
- Modify existing Google Sheets content
- Delete Google Sheets files
- Access sheet metadata (creation date, owner, sharing settings)
Google Drive:
- List and search all spreadsheet files in your Drive
- Read file metadata for Google Sheets
- Access sharing permissions and collaboration settings
- Other file types in Google Drive (documents, images, videos, etc.)
- Gmail or other Google services
- Personal account information beyond basic profile data
- Files in other Google accounts you may have access to
Local Token Storage:
- OAuth2 tokens are stored in
.oauth-tokens.jsonin the project directory - This file contains sensitive access credentials
- The file is created with default system permissions
- Tokens are stored in plain text (not encrypted)
Token Lifecycle:
- Access tokens typically expire after 1 hour
- Refresh tokens are used to obtain new access tokens automatically
- Refresh tokens can remain valid indefinitely until revoked
- No token data is transmitted to external servers (except Google's OAuth endpoints)
Before First Use:
- Review all OAuth2 permissions carefully in the Google consent screen
- Consider using a dedicated Google account for testing and development
- Ensure you trust the environment where you're running the server
- Verify that port 3000 is not exposed to external networks during OAuth flow
During Operation:
- Monitor the server's activity logs for unexpected behavior
- Regularly review which applications have access to your Google account
- Set up appropriate file sharing permissions on sensitive sheets
- Use the server only in trusted network environments
After Use:
- Consider revoking OAuth2 tokens when no longer needed
- Delete the
.oauth-tokens.jsonfile if decommissioning the server - Review and revoke application access at myaccount.google.com/permissions
If you suspect unauthorized access or misuse:
-
Immediate Action:
- Revoke application access at myaccount.google.com/permissions
- Delete the
.oauth-tokens.jsonfile - Stop the MCP server process
-
Investigation:
- Review Google account activity at myactivity.google.com
- Check Google Drive activity and access logs
- Review any recent changes to your Google Sheets
-
Reporting:
- Report security issues to the project maintainer
- Consider reporting to Google if you suspect broader account compromise
Security updates will be provided for the following versions:
| Version | Supported |
|---|---|
| 1.0.x | ✅ |
If you discover a security vulnerability, please report it privately to the project maintainer. Do not create public issues for security vulnerabilities.
Contact: Please create a private security advisory on GitHub or contact the maintainer directly.
Response Time: We aim to respond to security reports within 48 hours and provide updates on resolution progress.
If you're contributing to this project:
- Never log OAuth2 tokens or sensitive user data
- Use HTTPS for all Google API communications
- Implement proper error handling to avoid information leakage
- Follow OAuth2 security best practices
- Regularly update dependencies to address security vulnerabilities
- Use TypeScript strict mode to catch potential security issues
- This server operates under Google's API Terms of Service
- Users are responsible for compliance with their organization's data policies
- Consider data residency and privacy regulations in your jurisdiction
- Review Google's data processing and privacy policies before use
If you have questions about the security implications of using this server, please:
- Review this security policy thoroughly
- Test with non-sensitive data first
- Consult with your organization's security team if applicable
- Contact the project maintainer for clarification on specific security concerns
Remember: You are ultimately responsible for the security of your data and the decisions you make about granting access to third-party applications.