granola-mcp-server

Provides an experimental MCP (Model Context Protocol) stdio server that exposes Granola.ai meeting intelligence stored in local cache files (search, metadata, transcripts, documents/notes, and cross-meeting pattern analysis) to MCP-capable clients like Claude Desktop.

Evaluated Mar 30, 2026 (0d ago)
Repo ↗ Ai Ml mcp python stdio meeting-intelligence local-first pydantic granola-ai
⚙ Agent Friendliness
61
/ 100
Can an agent use this?
🔒 Security
32
/ 100
Is it safe for agents?
⚡ Reliability
32
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
70
Documentation
70
Error Messages
0
Auth Simplicity
95
Rate Limits
0

🔒 Security

TLS Enforcement
0
Auth Strength
30
Scope Granularity
0
Dep. Hygiene
55
Secret Handling
80

Documentation emphasizes local-only processing and read-only access to local cache files; no explicit secrets, network calls, or server auth are described. Lack of auth/scope controls means security primarily depends on local file permissions and how the MCP client spawns/accesses the process.

⚡ Reliability

Uptime/SLA
0
Version Stability
45
Breaking Changes
35
Error Recovery
50
AF Security Reliability

Best When

You have Granola.ai installed and populated local cache files, and you want a local MCP server to query them from an MCP client.

Avoid When

You need network-based access, strong server-side access control, or an officially documented cache/API contract guaranteed to remain stable over time.

Use Cases

  • Search meetings by title/content/participants/transcript text
  • Retrieve full transcripts with speaker identification
  • Fetch meeting metadata and associated documents/notes
  • Analyze patterns across meetings (topics/participants/frequency) over a date range
  • Support local, privacy-preserving meeting intelligence access via natural-language tool calls

Not For

  • Serving data to remote users over the network
  • Real-time meeting ingestion (server reads from a local cache, per documentation)
  • Cases requiring authenticated multi-tenant access control at the server boundary

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

OAuth: No Scopes: No

No auth mechanism is described for the MCP server. The design appears local-only and reads from local cache, relying on OS/process access rather than explicit server-side authentication.

Pricing

Free tier: No
Requires CC: No

Repository README describes local processing and does not mention any paid SaaS/API pricing for the MCP server itself.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Cache file not found if Granola cache has not been created/processed locally yet
  • Meeting notes may appear empty if rich notes are stored in documentPanels instead of notes_plain (can be toggled with GRANOLA_PARSE_PANELS=0)
  • Local timezone formatting depends on local detection or TZ override
  • If installed from source, Claude Desktop Full Disk Access / permission issues and working-directory issues can prevent the server from starting

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for granola-mcp-server.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-30.

6450
Packages Evaluated
19953
Need Evaluation
586
Need Re-evaluation
Community Powered