A Model Context Protocol (MCP) server that provides authenticated access to Google Workspace APIs, offering integrated Authentication, Gmail, Calendar, and Drive functionality
ATK-TA0001
ATK-TA0002
ATK-TA0003
ATK-TA0004
ATK-TA0005
ATK-TA0006
ATK-TA0007
ATK-TA0008
ATK-TA0009
ATK-TA0011
ATK-TA0010
ATK-TA0040
View all 4 scenarios in the Risk Scenarios tab
Critical
High
Medium
Low
The `gauth.example.json` file contains a placeholder client secret. If the example configuration is used in production without modification, it exposes the application to potential OAuth attacks.
The `redirect_uri` in `gauth.example.json` is set to `http://localhost:8080`. This is insecure as malicious applications running on the same machine can intercept the OAuth code.
The `smithery.yaml` file uses a `docker run` command with a volume mount that exposes the configuration directory to the container. This can allow an attacker to modify the configuration files and potentially gain control of the application.
The `accounts.example.json` file contains example accounts with placeholder access and refresh tokens. If used in production, this allows unauthorized access to the example account.
The project depends on `uuid@11.1.0`. While this version may not have known critical vulnerabilities, it is unusual to depend on a version 11 of a package when the current major version is much lower. This could indicate a typo or misunderstanding in dependency management.