OAuth grants are the quiet back door of modern SaaS, and the rise of remote MCP servers is only making that back door wider. Every time an employee clicks "Sign in with Google" or hooks an AI agent to a new MCP server, another vendor gets a key to your data, often without IT or security in the loop. Most of those grants are low-risk. Some are not. This checklist gives you a repeatable way to tell the difference before a permissive scope turns into an incident.
‍
Security leaders, IT admins, and GRC practitioners who need a repeatable way to evaluate OAuth grants and MCP server connections before they turn into supply-chain risk.
