google-workspace
Audited by Socket on Feb 24, 2026
1 alert found:
Obfuscated FileThe configuration itself is not malicious code, but it contains security-sensitive choices that increase attack surface: persisting refresh tokens and client secrets to local files (mycreds.txt and client_secrets.json) and requesting broad Google API scopes that permit reading and modifying user data. If the host or files are not properly protected (encryption, strict file permissions, secure secret storage), an attacker or malicious local process could steal refresh tokens and gain long-lived access to user Drive/Docs/Sheets/Presentations. Recommended mitigations: use least-privilege scopes, store client secrets and tokens in secure OS keychain or KMS, encrypt persisted credentials, apply strict file permissions, rotate/revoke refresh tokens if compromise is suspected, and document storage lifecycle and access controls.