Back to Home
taylorwilsdon icon

google_workspace_mcp

Verified Safe

by taylorwilsdon

Overview

Provides comprehensive natural language control over Google Workspace services (Gmail, Calendar, Drive, Docs, Sheets, Slides, Forms, Tasks, Chat, Custom Search) through MCP clients and AI assistants.

Installation

Run Command
uvx workspace-mcp --tool-tier core

Environment Variables

  • GOOGLE_OAUTH_CLIENT_ID
  • GOOGLE_OAUTH_CLIENT_SECRET
  • USER_GOOGLE_EMAIL
  • GOOGLE_PSE_API_KEY
  • GOOGLE_PSE_ENGINE_ID
  • MCP_SINGLE_USER_MODE
  • MCP_ENABLE_OAUTH21
  • WORKSPACE_MCP_STATELESS_MODE
  • EXTERNAL_OAUTH21_PROVIDER
  • OAUTHLIB_INSECURE_TRANSPORT
  • WORKSPACE_MCP_BASE_URI
  • WORKSPACE_MCP_PORT
  • WORKSPACE_EXTERNAL_URL
  • GOOGLE_OAUTH_REDIRECT_URI
  • GOOGLE_CLIENT_SECRET_PATH
  • GOOGLE_MCP_CREDENTIALS_DIR
  • WORKSPACE_MCP_OAUTH_PROXY_STORAGE_BACKEND
  • WORKSPACE_MCP_OAUTH_PROXY_DISK_DIRECTORY
  • WORKSPACE_MCP_OAUTH_PROXY_VALKEY_HOST
  • WORKSPACE_MCP_OAUTH_PROXY_VALKEY_PORT
  • WORKSPACE_MCP_OAUTH_PROXY_VALKEY_DB
  • WORKSPACE_MCP_OAUTH_PROXY_VALKEY_USE_TLS
  • WORKSPACE_MCP_OAUTH_PROXY_VALKEY_USERNAME
  • WORKSPACE_MCP_OAUTH_PROXY_VALKEY_PASSWORD
  • WORKSPACE_MCP_OAUTH_PROXY_VALKEY_REQUEST_TIMEOUT_MS
  • WORKSPACE_MCP_OAUTH_PROXY_VALKEY_CONNECTION_TIMEOUT_MS

Security Notes

The server employs robust security practices, including a strong emphasis on loading sensitive credentials (Google OAuth Client ID and Secret, Custom Search API Key/Engine ID) from environment variables or Kubernetes secrets, explicitly discouraging hardcoding. It supports OAuth 2.1 for multi-user, bearer token authentication, with an `AuthInfoMiddleware` to process and validate tokens. A stateless mode (`WORKSPACE_MCP_STATELESS_MODE=true`) is available for containerized deployments to avoid file system writes. Attachment handling for Drive files uses temporary storage with expiration. The `create_drive_file` tool's support for fetching content from `file://`, `http://`, and `https://` URLs, while a powerful feature, could be a potential SSRF vector if the execution environment is not secured. Warnings regarding `OAUTHLIB_INSECURE_TRANSPORT=1` for development-only HTTP redirects are clearly stated, emphasizing HTTPS for production. The Helm chart sets good defaults for pod security contexts (non-root, dropped capabilities). Overall, the project demonstrates a high level of security awareness.

Similar Servers

Stats

Interest Score97
Security Score9
Cost ClassMedium
Avg Tokens1000
Stars1142
Forks341
Last Update2026-01-07

Tags

Google WorkspaceAI AssistantMCPProductivityAutomation