Tracecat

Google Drive MCP server

Search, read, and create files across Google Drive from your AI agents.

Productivity
http
Official docs

About

Connect Tracecat to Google Drive to put investigation artifacts in the right place for SOC analysts and engineering teams that run on Google Workspace. You can search shared drives for the latest runbook, read file contents, and inspect sharing permissions before opening a case. From there, write triage summaries back to the analyst's Drive, stash generated reports from automated workflows, and check who a sensitive document was shared with, all under the connected user's Workspace identity.

Setup

  1. 1

    Sign in with OAuth

    You'll authorize Tracecat to access Google Drive on your behalf. No API keys to manage.

  2. 2

    Select the Google Drive tile in the Tracecat MCP catalog

    Open the MCP catalog in your workspace, select the Google Drive tile, and complete the OAuth flow.

  3. 3

    Enable Google Drive in your agent

    In your ai.agent action or Agents tools tab, select Google Drive from the MCP integrations dropdown.

Tools

search_filesSearch Drive for files matching a query, with optional MIME-type and date filters.
list_recent_filesList the most recently modified files the user can access.
get_file_metadataFetch metadata for a Drive file, including owner, MIME type, and timestamps.
get_file_permissionsList sharing permissions on a file, including users, groups, and domains.
read_file_contentRead the text or extracted content of a Drive file.
download_file_contentDownload the raw bytes of a Drive file by ID.
create_fileCreate a new file in Drive with name, MIME type, and content.

Deploy the Google Drive MCP server in minutes

Connect your security agents to 50+ hosted MCP servers.

Self-host free