Google Workspace (No Cloud Console)

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: google-workspace-mcp Version: 1.0.0 The skill is classified as suspicious due to its broad access to Google Workspace data and its reliance on executing an external npm package (`@presto-ai/google-workspace-mcp`) via `npm install -g` and `npx`, which introduces a supply chain risk. While the capabilities like downloading files (`drive.downloadFile`, `gmail.downloadAttachment`) and sending emails/messages are plausibly needed for a comprehensive Google Workspace integration, they represent significant risky capabilities. No explicit prompt injection attempts against the AI agent or other clear malicious intent are found in the `SKILL.md` or `_meta.json` files themselves.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A changed or compromised npm package version could run locally and handle the user's Google OAuth session and Workspace data.

Why it was flagged

The runnable MCP code is fetched and executed from an unpinned npm package, while the artifact set contains only SKILL.md and no package code for review.

Skill content
npm install -g @presto-ai/google-workspace-mcp
mcporter config add google-workspace --command "npx" --arg "-y" --arg "@presto-ai/google-workspace-mcp" --scope home
Recommendation

Only install after verifying the package publisher and source; prefer a pinned version and review the package before authorizing Google access.

What this means

The agent or MCP server may be able to read sensitive Google data and perform actions as the signed-in Google user, depending on granted OAuth scopes.

Why it was flagged

The skill uses persistent Google OAuth credentials for broad delegated account access, including mail, calendar, and chat actions, even though registry requirements list no primary credential.

Skill content
On first use, it opens a browser for Google OAuth. Credentials stored in `~/.config/google-workspace-mcp/` ... Gmail: gmail.search, gmail.get, gmail.send ... Calendar: calendar.createEvent, calendar.updateEvent, calendar.deleteEvent ... Chat: chat.sendMessage
Recommendation

Review the Google consent screen carefully, use the least-privileged account possible, and revoke the OAuth grant if the skill is no longer needed.

What this means

A mistaken or over-eager agent action could send emails or chat messages, change documents, modify Gmail state, or alter calendar events.

Why it was flagged

The exposed tools include high-impact mutation and messaging operations, but the instructions do not state that the agent must ask for explicit user confirmation before using them.

Skill content
docs.insertText, docs.appendText, docs.replaceText ... calendar.updateEvent, calendar.deleteEvent ... gmail.send, gmail.modify ... chat.sendMessage, chat.sendDm
Recommendation

Require explicit user approval before any send, delete, update, or write action, and test first with low-risk accounts or data.

What this means

Emails, documents, spreadsheets, and other Workspace content returned by tools may enter the agent session where they can be used in later reasoning.

Why it was flagged

Sensitive Google Workspace content is routed through a local MCP tool bridge, which is expected for this integration but important for users to understand.

Skill content
Uses `@presto-ai/google-workspace-mcp` ... mcporter call --server google-workspace --tool "gmail.get" ... docs.getText ... sheets.getText
Recommendation

Avoid retrieving unnecessary sensitive content and limit use to workspaces/accounts where this data flow is acceptable.