Google Cloud MCP Server

Google Cloud Platform MCP server enabling AI agents to interact with GCP services — managing Cloud Run services, querying GKE clusters, inspecting Cloud Storage, monitoring Cloud Functions, accessing Cloud SQL, and integrating GCP's infrastructure capabilities into agent-driven cloud management and DevOps workflows.

Evaluated Mar 06, 2026 (0d ago) vcurrent
Homepage ↗ Repo ↗ Developer Tools google-cloud gcp cloud-run gke mcp-server infrastructure gcloud
⚙ Agent Friendliness
71
/ 100
Can an agent use this?
🔒 Security
83
/ 100
Is it safe for agents?
⚡ Reliability
72
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
70
Documentation
75
Error Messages
72
Auth Simplicity
65
Rate Limits
72

🔒 Security

TLS Enforcement
100
Auth Strength
85
Scope Granularity
80
Dep. Hygiene
72
Secret Handling
75

TLS via GCP SDK. Google Cloud IAM. SOC2, HIPAA, GDPR. Community MCP server. Use ADC or Workload Identity over service account JSON keys. Apply least-privilege per GCP service.

⚡ Reliability

Uptime/SLA
80
Version Stability
68
Breaking Changes
70
Error Recovery
68
AF Security Reliability

Best When

An agent needs multi-service GCP access — Cloud Run, GKE, GCS, Cloud Functions — without needing deep coverage of a single GCP service.

Avoid When

You need deep functionality for specific GCP services like BigQuery or Pub/Sub — dedicated MCPs for those services offer better coverage.

Use Cases

  • Querying Cloud Run service status and logs from operations agents
  • Inspecting GKE cluster and workload state from platform engineering agents
  • Managing Cloud Storage buckets from data pipeline agents
  • Monitoring Cloud Functions from debugging agents
  • Accessing Cloud SQL databases from data analysis agents
  • Auditing GCP resource configuration from security agents

Not For

  • Teams using AWS or Azure (use AWS or Azure MCPs for those platforms)
  • Deep GCP-service-specific operations (use dedicated BigQuery, Pub/Sub MCPs for depth)
  • Teams needing compliance-audited GCP access (use Cloud Asset Inventory or Security Command Center)

Interface

REST API
Yes
GraphQL
No
gRPC
Yes
MCP Server
Yes
SDK
Yes
Webhooks
No

Authentication

Methods: oauth2 service_account
OAuth: Yes Scopes: Yes

Google Cloud authentication via Application Default Credentials (ADC), service account JSON key, or OAuth 2.0. GCP IAM controls permissions per service. Workload Identity recommended in GKE.

Pricing

Model: usage-based
Free tier: Yes
Requires CC: Yes

GCP new accounts get $300 credit. Individual services have their own free tiers. Community MCP server is open source and free.

Agent Metadata

Pagination
cursor
Idempotent
Partial
Retry Guidance
Not documented

Known Gotchas

  • GCP auth setup: ADC vs service account vs user credentials — different setup per environment
  • GCP project ID must be specified for most operations
  • IAM permissions are service-specific — need separate permissions for each GCP service used
  • Community MCP server — GCP API surface is huge, coverage will be partial
  • API enablement required — each GCP API must be enabled in the project before use
  • Service account key files are sensitive — must be protected as secrets

Alternatives

Full Evaluation Report

Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for Google Cloud MCP Server.

$99

Scores are editorial opinions as of 2026-03-06.

5215
Packages Evaluated
26151
Need Evaluation
173
Need Re-evaluation
Community Powered