D

GCP MCP Server

Community MCP server for Google Cloud Platform that executes arbitrary GCP code via vm.runInContext

Overall Score42/100

Score Breakdown

Server Info

Package
gcp-mcp
Registry
npm
Maintainer
Community
Category
Cloud & Infrastructure
Tags
gcpcloudgoogle
Last Scanned
7 Apr 2026

Findings

12 issues

Authentication & Identity

HIGHNo per-request auth - requires instance-per-user

Stdio-only transport. Uses GoogleAuth with cloud-platform scope, relying on Application Default Credentials (ADC). No explicit env vars are read by the server itself; authentication is handled by the google-auth-library which reads GOOGLE_APPLICATION_CREDENTIALS or uses gcloud auth. For multi-tenant deployment, the platform must spawn a separate server instance per user.

Remediation

Add HTTP/SSE transport to accept per-request Authorization headers, or implement the MCP OAuth spec.

Tool Schema Quality

MEDIUMOnly 0 of 9 schemas have parameter constraints

Most schemas lack maxLength, enum, or pattern constraints on string parameters.

Remediation

Add constraints to string parameters, especially on write operations.

CRITICALDangerous execution surface: run-gcp-code

Tool allows raw code/query execution which could be exploited via prompt injection.

Remediation

Use parameterized queries or validated command sets.

Permission Granularity

MEDIUM1 tools combine read and write operations

The run-gcp-code tool is a god-mode tool that can perform any GCP operation including creating, modifying, and deleting resources. It mixes read and write capabilities in a single tool with no restrictions. The select-project tool modifies server state. Dedicated read tools (billing, clusters, SQL, logs) are separate but redundant given run-gcp-code.

Remediation

Split into separate read and write tools.

HIGH1 destructive operations not isolated

Admin/delete tools are mixed with regular operations and cannot be independently disabled.

Remediation

Namespace admin tools separately for independent access control.

LOWTool descriptions lack resource scope

Descriptions don't specify what data types or resources they access.

Remediation

Add resource type statements to descriptions.

LLM Safety

MEDIUM1 tool descriptions are too vague

Short or generic descriptions make tool selection unreliable.

Remediation

Expand descriptions with specific actions, data types, and side effects.

HIGHTool descriptions contain instructional language

Descriptions include directives that could influence LLM behavior beyond tool selection.

Remediation

Remove instructional language. Descriptions should be purely factual.

Data Exposure

MEDIUM4 list operations lack pagination

get-logs has pageSize parameter (default 10). list-projects, list-gke-clusters, list-sql-instances, and list-projects return all results without pagination. run-gcp-code instructs the LLM to handle pagination but that depends on generated code quality.

Remediation

Add limit/offset or cursor-based pagination.

LOWNo field selection on responses

Responses return full records rather than projected fields.

Remediation

Implement field selection to return only relevant fields.

Maintenance & Trust

LOWCommunity-maintained by Oluwapelumi Oluwaseyi (eniayomi)

No official vendor backing.

Remediation

Seek vendor verification.

HIGH27 dependency vulnerabilities (5 critical, 8 high)

npm audit found 5 critical and 8 high severity CVEs.

Remediation

Run `npm audit fix` and update vulnerable dependencies.

Tools

9 total
NameDescriptionRisk
run-gcp-codeRun GCP codeadmin
list-projectsList all GCP projects accessible with current credentialsread
select-projectSelects GCP project to use for subsequent interactionswrite
get-billing-infoGet billing information for the current projectread
get-cost-forecastGet cost forecast for the current projectread
get-billing-budgetGet billing budgets for the current projectread
list-gke-clustersList all GKE clusters in the current projectread
list-sql-instancesList all Cloud SQL instances in the current projectread
get-logsGet Cloud Logging entries for the current projectread

Deploy GCP MCP Server securely

CompleteFlow adds per-user authentication, permission scoping, and audit logging to any MCP server out of the box.

Deploy on CompleteFlow