Open a private security advisory on the repo: https://github.com/arcbaslow/google-analytics-agent/security/advisories/new
Please do not file public issues for security problems.
- Credential handling in
scripts/ga4_auth.pyand any path that touches~/.claude/ga4-credentials.jsonor gcloud ADC files - PII handling in
scripts/ga4_utils.py(thescrub_piidenylist + regex pass) - Any code path that sends user data to a third-party endpoint
- Any command that performs an Admin API write (event rules, audiences, custom defs, key events) without an explicit confirmation prompt
- Dependency-chain vulnerabilities in the Google client libraries
pinned in
scripts/requirements.txt
- Misuse of the toolkit against a property you do not own
- Bugs in the upstream Google APIs themselves — report those to Google
- Issues that require an attacker with shell access to the user's
machine (they already own
~/.claude/)
- gcloud ADC (default path):
~/.config/gcloud/application_default_credentials.json - Legacy OAuth (fallback path):
~/.claude/ga4-credentials.json(file mode0600on POSIX) - Service account / external account:
GOOGLE_APPLICATION_CREDENTIALSenv var
The toolkit never logs credentials to stdout, never sends them to a
third party, and never bakes them into report files. Cached API
responses under ~/.claude/ga4-cache/ are scrubbed of PII (emails,
phone numbers, ID-like keys) before being written.
I aim to acknowledge security reports within 7 days and ship a fix or mitigation within 30 days. For high-severity issues affecting active users, both windows shrink.