Back to Home
bassa01 icon

google-cloud-mcp

Verified Safe

by bassa01

Overview

Provides a Model Context Protocol (MCP) server that connects to Google Cloud services to offer context and tools for interacting with various Google Cloud resources.

Installation

Run Command
npx tsx src/index.ts

Environment Variables

  • GOOGLE_APPLICATION_CREDENTIALS
  • GOOGLE_CLOUD_PROJECT
  • MCP_ENABLED_SERVICES
  • LAZY_AUTH
  • SPANNER_INSTANCE
  • SPANNER_DATABASE
  • BIGQUERY_LOCATION
  • LOG_PAYLOAD_FULL_ACCESS_ROLES
  • LOG_ANALYTICS_LOCATION
  • LOG_ANALYTICS_BUCKET
  • LOG_ANALYTICS_VIEW
  • GOOGLE_CLOUD_DOCS_CATALOG
  • DEBUG
  • LOG_LEVEL
  • NODE_ENV

Security Notes

The server integrates with the Google Cloud CLI (`gcloud`), which is inherently a high-risk operation. However, the codebase implements robust guardrails to mitigate this risk, including: 1. A strict read-only policy for `gcloud` commands, blocking mutable verbs (e.g., `create`, `delete`, `update`) and sensitive prefixes (e.g., `iam`, `secret-manager`, `kms`). 2. Enforcement of service account identity for `gcloud` commands, preventing execution with personal credentials. 3. Comprehensive read-only assertion for SQL queries in BigQuery and Spanner, explicitly denying destructive statements (`INSERT`, `UPDATE`, `DELETE`, `DROP`, `ALTER`, `CREATE`). 4. Log redaction policies to scrub sensitive data (IPs, user identifiers, request bodies) from Logging outputs unless explicitly authorized by roles. 5. General input sanitization and rate-limiting via an `McpSecurityValidator`. While the `gcloud` CLI integration remains a potential vector, the implemented policies significantly reduce its exploitability. No obvious hardcoded secrets or `eval` misuse were found.

Similar Servers

Stats

Interest Score0
Security Score8
Cost ClassMedium
Avg Tokens2000
Stars0
Forks0
Last Update2025-11-19

Tags

Google CloudMCPNode.jsObservabilityCloud Management