Critical-risk tools in Google Workspace Gmail (gws CLI)
12 of the 79 tools in Google Workspace Gmail (gws CLI) are classified as critical risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at critical risk
-
gmail_users_drafts_deleteDestructive 4/5Permanently delete a draft
-
gmail_users_labels_deleteDestructive 4/5Permanently delete a label from all messages
-
gmail_users_messages_batchDeleteDestructive 5/5Permanently batch delete messages by ID
-
gmail_users_messages_deleteDestructive 5/5Permanently delete a message
-
gmail_users_settings_cse_identities_deleteDestructive 5/5Permanently delete a CSE identity
-
gmail_users_settings_cse_keypairs_obliterateDestructive 5/5Permanently destroy a CSE keypair
-
gmail_users_settings_delegates_deleteDestructive 5/5Remove a mailbox delegate and revoke access
-
gmail_users_settings_filters_deleteDestructive 4/5Permanently delete a message filter
-
gmail_users_settings_forwardingAddresses_deleteDestructive 4/5Delete a forwarding address
-
gmail_users_settings_sendAs_deleteDestructive 4/5Delete a send-as alias
-
gmail_users_settings_sendAs_smimeInfo_deleteDestructive 5/5Delete an S/MIME config for a send-as alias
-
gmail_users_threads_deleteDestructive 5/5Permanently delete a thread and all messages
Attacks that target this class
Critical-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Google Workspace Gmail (gws CLI)
Enforce policy on Google Workspace Gmail (gws CLI)
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init