google_workspace_mcp
Verified Safeby taylorwilsdon
Overview
Provides comprehensive natural language control over Google Workspace services (Gmail, Calendar, Drive, Docs, Sheets, Slides, Forms, Tasks, Chat, Custom Search) through MCP clients and AI assistants.
Installation
uvx workspace-mcp --tool-tier coreEnvironment Variables
- GOOGLE_OAUTH_CLIENT_ID
- GOOGLE_OAUTH_CLIENT_SECRET
- USER_GOOGLE_EMAIL
- GOOGLE_PSE_API_KEY
- GOOGLE_PSE_ENGINE_ID
- MCP_SINGLE_USER_MODE
- MCP_ENABLE_OAUTH21
- WORKSPACE_MCP_STATELESS_MODE
- EXTERNAL_OAUTH21_PROVIDER
- OAUTHLIB_INSECURE_TRANSPORT
- WORKSPACE_MCP_BASE_URI
- WORKSPACE_MCP_PORT
- WORKSPACE_EXTERNAL_URL
- GOOGLE_OAUTH_REDIRECT_URI
- GOOGLE_CLIENT_SECRET_PATH
- GOOGLE_MCP_CREDENTIALS_DIR
- WORKSPACE_MCP_OAUTH_PROXY_STORAGE_BACKEND
- WORKSPACE_MCP_OAUTH_PROXY_DISK_DIRECTORY
- WORKSPACE_MCP_OAUTH_PROXY_VALKEY_HOST
- WORKSPACE_MCP_OAUTH_PROXY_VALKEY_PORT
- WORKSPACE_MCP_OAUTH_PROXY_VALKEY_DB
- WORKSPACE_MCP_OAUTH_PROXY_VALKEY_USE_TLS
- WORKSPACE_MCP_OAUTH_PROXY_VALKEY_USERNAME
- WORKSPACE_MCP_OAUTH_PROXY_VALKEY_PASSWORD
- WORKSPACE_MCP_OAUTH_PROXY_VALKEY_REQUEST_TIMEOUT_MS
- WORKSPACE_MCP_OAUTH_PROXY_VALKEY_CONNECTION_TIMEOUT_MS
Security Notes
The server employs robust security practices, including a strong emphasis on loading sensitive credentials (Google OAuth Client ID and Secret, Custom Search API Key/Engine ID) from environment variables or Kubernetes secrets, explicitly discouraging hardcoding. It supports OAuth 2.1 for multi-user, bearer token authentication, with an `AuthInfoMiddleware` to process and validate tokens. A stateless mode (`WORKSPACE_MCP_STATELESS_MODE=true`) is available for containerized deployments to avoid file system writes. Attachment handling for Drive files uses temporary storage with expiration. The `create_drive_file` tool's support for fetching content from `file://`, `http://`, and `https://` URLs, while a powerful feature, could be a potential SSRF vector if the execution environment is not secured. Warnings regarding `OAUTHLIB_INSECURE_TRANSPORT=1` for development-only HTTP redirects are clearly stated, emphasizing HTTPS for production. The Helm chart sets good defaults for pod security contexts (non-root, dropped capabilities). Overall, the project demonstrates a high level of security awareness.
Similar Servers
gcloud-mcp
Enables AI assistants to interact with the Google Cloud environment using the gcloud CLI for natural language cloud management and workflow automation.
google-docs-mcp
Allows AI assistants to programmatically interact with Google Docs, Sheets, and Drive for document management, editing, formatting, and file organization.
google-drive-mcp
Provides an MCP server for secure integration and file management with Google Drive, Docs, Sheets, and Slides for AI clients.
mcp-server-google-workspace
Provides programmatic control over Google Workspace applications (Sheets, Docs, Drive, Gmail, Calendar, Slides) through a Model Context Protocol (MCP) server for AI automation.