Google Drive MCP server
Search, read, and create files across Google Drive from your AI agents.
About
Connect Tracecat to Google Drive to put investigation artifacts in the right place for SOC analysts and engineering teams that run on Google Workspace. You can search shared drives for the latest runbook, read file contents, and inspect sharing permissions before opening a case. From there, write triage summaries back to the analyst's Drive, stash generated reports from automated workflows, and check who a sensitive document was shared with, all under the connected user's Workspace identity.
Setup
- 1
Sign in with OAuth
You'll authorize Tracecat to access Google Drive on your behalf. No API keys to manage.
- 2
Select the
Google Drivetile in the Tracecat MCP catalogOpen the
MCP catalogin your workspace, select theGoogle Drivetile, and complete the OAuth flow. - 3
Enable
Google Drivein your agentIn your
ai.agentaction orAgents→toolstab, selectGoogle Drivefrom theMCP integrationsdropdown.
Tools
search_files | Search Drive for files matching a query, with optional MIME-type and date filters. |
list_recent_files | List the most recently modified files the user can access. |
get_file_metadata | Fetch metadata for a Drive file, including owner, MIME type, and timestamps. |
get_file_permissions | List sharing permissions on a file, including users, groups, and domains. |
read_file_content | Read the text or extracted content of a Drive file. |
download_file_content | Download the raw bytes of a Drive file by ID. |
create_file | Create a new file in Drive with name, MIME type, and content. |