Tmp.MUCwv7RM8M
AdvisoryAudited by Static analysis on May 12, 2026.
Overview
No suspicious patterns detected.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
An agent could accidentally delete, move, rename, or share Drive files if it misinterprets a request or acts too broadly.
The tool surface includes destructive and sharing actions on Google Drive, but the artifact does not describe confirmation requirements, scope limits, or rollback guidance.
Plus 5 auth tools and 9 base Drive tools (ls, search, get, mkdir, rename, move, delete, share, run).
Use only with clear user instructions, require explicit confirmation before delete/share/move operations, and prefer limiting access to a dedicated or least-privileged Google account.
The agent may operate with the same Drive permissions as the configured Google account, including access to private or business files.
The skill depends on existing Google authentication and can use that account for Drive operations, but the artifact does not specify OAuth scopes, credential boundaries, or account-isolation guidance.
- [gogcli](https://github.com/steipete/gogcli) installed and authenticated
Review the Google account and OAuth scopes used by gogcli, avoid using a highly privileged account, and revoke credentials if the skill is no longer needed.
If the npm package or its dependencies are compromised or change behavior, they could affect the authenticated Drive account.
The setup runs an npm package at runtime with automatic yes behavior and no version pin in the artifact; this is common for MCP setup but should be reviewed because the package receives Drive authority.
"command": "npx", "args": ["-y", "gogcli-mcp-drive"]
Pin and review the package version where possible, install from a trusted source, and monitor package provenance before granting Drive access.
Private Drive filenames, metadata, comments, and downloaded/uploaded content may be exposed to the agent and MCP tooling during use.
Drive data and commands would flow through an MCP server; this is purpose-aligned, but the artifact does not describe data-handling boundaries or retention.
Extended Google Drive MCP server via [gogcli](https://github.com/steipete/gogcli)
Avoid using the skill with highly sensitive files unless you understand the MCP server’s data handling and trust the runtime environment.
