data
Google Data Manager MCP Gateway for AI Agents
Expose Google Data Manager tools to Claude Code, Cursor, Codex, and other MCP clients through the local KosmoKrator MCP gateway.
6 functions 2 read 4 write oauth2 auth
Google Data Manager MCP Gateway
Expose Google Data Manager to MCP clients with `kosmokrator mcp:serve --integration=google_data_manager`.
If the client has never used KosmoKrator before, install it first, then register this integration as a stdio MCP server. The gateway exposes only the selected integration in the example below.
curl -fsSL https://raw.githubusercontent.com/OpenCompanyApp/kosmokrator/main/install.sh | bash kosmokrator mcp:gateway:install --integration=google_data_manager --write=deny --json {
"mcpServers": {
"kosmokrator-google_data_manager": {
"type": "stdio",
"command": "kosmo",
"args": [
"mcp:serve",
"--integration=google_data_manager",
"--write=deny"
]
}
}
} Serve Manually
kosmokrator mcp:serve --integration=google_data_manager --write=deny MCP Tool Names
KosmoKrator exposes integration tools through the gateway with stable names:
| MCP tool | Source function | Type |
|---|---|---|
integration__google_data_manager__google_data_manager_diagnostics | google_data_manager.google_data_manager_diagnostics | Read read |
integration__google_data_manager__google_data_manager_ingest_events | google_data_manager.google_data_manager_ingest_events | Write write |
integration__google_data_manager__google_data_manager_ingest_audience_members | google_data_manager.google_data_manager_ingest_audience_members | Write write |
integration__google_data_manager__google_data_manager_remove_audience_members | google_data_manager.google_data_manager_remove_audience_members | Write write |
integration__google_data_manager__google_data_manager_retrieve_request_status | google_data_manager.google_data_manager_retrieve_request_status | Read read |
integration__google_data_manager__google_data_manager_raw_request | google_data_manager.google_data_manager_raw_request | Write write |
Write Access
Start with --write=deny for read-only MCP clients. Use --write=ask or
--write=allow only when the client and workspace are trusted.