Google Workspace (No Cloud Console)

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This appears to be a Google Workspace connector, but it delegates broad Google account access to an unpinned external npm MCP package and lacks clear guardrails for account-changing actions.

Review this skill carefully before installing. Use it only if you trust the npm package and OAuth app, inspect the Google consent scopes, require confirmation before account-changing actions, and consider using a dedicated or low-risk Google account. If uninstalling, clear the stored credentials and revoke the OAuth grant from your Google account.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A changed or compromised npm package version could run locally and handle the user's Google OAuth session and Workspace data.

Why it was flagged

The runnable MCP code is fetched and executed from an unpinned npm package, while the artifact set contains only SKILL.md and no package code for review.

Skill content
npm install -g @presto-ai/google-workspace-mcp
mcporter config add google-workspace --command "npx" --arg "-y" --arg "@presto-ai/google-workspace-mcp" --scope home
Recommendation

Only install after verifying the package publisher and source; prefer a pinned version and review the package before authorizing Google access.

What this means

The agent or MCP server may be able to read sensitive Google data and perform actions as the signed-in Google user, depending on granted OAuth scopes.

Why it was flagged

The skill uses persistent Google OAuth credentials for broad delegated account access, including mail, calendar, and chat actions, even though registry requirements list no primary credential.

Skill content
On first use, it opens a browser for Google OAuth. Credentials stored in `~/.config/google-workspace-mcp/` ... Gmail: gmail.search, gmail.get, gmail.send ... Calendar: calendar.createEvent, calendar.updateEvent, calendar.deleteEvent ... Chat: chat.sendMessage
Recommendation

Review the Google consent screen carefully, use the least-privileged account possible, and revoke the OAuth grant if the skill is no longer needed.

What this means

A mistaken or over-eager agent action could send emails or chat messages, change documents, modify Gmail state, or alter calendar events.

Why it was flagged

The exposed tools include high-impact mutation and messaging operations, but the instructions do not state that the agent must ask for explicit user confirmation before using them.

Skill content
docs.insertText, docs.appendText, docs.replaceText ... calendar.updateEvent, calendar.deleteEvent ... gmail.send, gmail.modify ... chat.sendMessage, chat.sendDm
Recommendation

Require explicit user approval before any send, delete, update, or write action, and test first with low-risk accounts or data.

What this means

Emails, documents, spreadsheets, and other Workspace content returned by tools may enter the agent session where they can be used in later reasoning.

Why it was flagged

Sensitive Google Workspace content is routed through a local MCP tool bridge, which is expected for this integration but important for users to understand.

Skill content
Uses `@presto-ai/google-workspace-mcp` ... mcporter call --server google-workspace --tool "gmail.get" ... docs.getText ... sheets.getText
Recommendation

Avoid retrieving unnecessary sensitive content and limit use to workspaces/accounts where this data flow is acceptable.