Forem

Alexey Panteleev
Alexey Panteleev

Posted on

The Hidden Risk of Using Shared OAuth Apps (Nylas, Unipile, etc.)

If you’re building a product that integrates with Gmail or other Google services, you’ve probably run into a major hurdle:

Google OAuth verification for restricted scopes (like Gmail) is painful, expensive, and slow.

Platforms like Nylas and Unipile offer an appealing shortcut:

  • No need to create your own Google Cloud project
  • No need to pass OAuth verification
  • No need to undergo a security assessment

You just plug into their shared, already-verified app and ship faster.

It’s a compelling value proposition.

But there’s a tradeoff that’s often under-discussed — and it’s a big one.


The Convenience: Why Shared Apps Exist

The shared app model solves a real problem.

Google requires:

  • OAuth verification for sensitive/restricted scopes
  • Annual third-party security audits (for Gmail, etc.)
  • Clear privacy policies and strict compliance

For most startups, that’s:

  • expensive
  • time-consuming
  • sometimes a blocker to launching at all

So platforms like Nylas step in and say:

“Use our verified app. We’ve already done the hard part.”

And it works.


The Risk: You Don’t Control Your Own Access

When you use a shared app, you are not the app in Google’s eyes.

Instead:

  • The OAuth client = Nylas (or Unipile)
  • The verified entity = Nylas
  • The security audit = Nylas

Your product is downstream.

That leads to a critical dependency:

If Google revokes or suspends that shared app, your integration breaks — instantly.

Not just for you.

For every customer using that platform.


A Single Point of Failure

This creates a structural risk:


Google → Shared OAuth App (Nylas/Unipile) → Your App → Your Users

Enter fullscreen mode Exit fullscreen mode

If something goes wrong at the platform level:

  • Policy violation
  • Security incident
  • Misrepresentation
  • Abuse by any customer

Google doesn’t block “one bad actor.”

They can:

shut down or restrict the entire OAuth app

Which means:

  • Your users lose Gmail connectivity
  • Your core feature may stop working overnight
  • You have no direct recourse with Google

You’re not the verified party — the platform is.


You Inherit Everyone Else’s Risk

This is the part many developers underestimate.

With a shared app:

  • You’re not just trusting Nylas or Unipile
  • You’re trusting every other developer using that same app

Because:

  • Google sees one app
  • One set of scopes
  • One policy surface

If another customer:

  • misuses email data
  • violates Google’s API policy
  • triggers enforcement

👉 You can get caught in the blast radius.


Limited Visibility, Limited Control

There’s another subtle issue:

Google’s verification system is designed to ensure:

  • the app is legitimate
  • the app is secure
  • the app accurately represents its data usage

But with a shared app:

  • Google verifies the platform
  • Not your product

So:

  • Your app is not reviewed
  • Your data handling is not audited
  • Your use case is not directly evaluated

From Google’s perspective:

The platform is the app accessing Gmail data.


My Take: This Is a Half Measure

Here’s the uncomfortable truth.

If Google’s goal is to:

protect user email data and ensure it is handled securely

Then the shared app model is, at best, a half measure.

Because in reality:

  • Email data does not stay within the platform
  • It flows into your application
  • It gets stored, processed, and used by your systems

Yet:

  • Your infrastructure is not audited by Google
  • Your security practices are not verified by Google
  • Your actual use of the data is largely invisible to Google

So the system ends up enforcing:

✅ Security and compliance at the platform level

❌ But not at the end application level, where data actually lives


Why Google Still Allows It

To be fair, there’s a reason this model exists.

If Google required every app to:

  • pass verification
  • undergo security audits

…it would kill a huge portion of the developer ecosystem.

So instead, Google made a tradeoff:

  • Trust a smaller number of intermediaries
  • Hold them accountable
  • Accept reduced visibility downstream

When Using a Shared App Makes Sense

Despite the risks, shared apps can still be the right choice if:

  • You’re early-stage and need speed
  • You’re validating a product idea
  • Email integration is not mission-critical (yet)
  • You’re okay with platform dependency

When You Should Be Careful

You should think twice if:

  • Email is core to your product
  • You need long-term stability
  • You’re building enterprise-facing features
  • You want full control over compliance and security

In those cases, relying entirely on a shared app can become a liability.


A More Durable Path (Without Shared Apps)

If you’re building a product where email access is core, the more durable approach is to own the integration from day one.

That typically means:

  • Creating your own Google Cloud project
  • Implementing OAuth directly
  • Going through Google’s verification process
  • Completing the required security assessment (for restricted scopes)

Yes — it’s slower and more expensive upfront.

But in return, you get:

  • full control over your integration
  • a direct relationship with Google
  • no dependency on a third-party platform’s approval status
  • isolation from risks caused by other apps

A Practical Middle Ground: Allow-Listing

If full verification isn’t immediately feasible, you can consider an app allow-listing approach:

  • Restrict your app to specific Google Workspace domains or test users
  • Work with Google to approve limited usage without full public rollout
  • Use this phase to validate your product and prepare for full verification

This lets you:

  • stay compliant with Google’s policies
  • avoid the shared-app dependency entirely
  • incrementally move toward full production readiness

Final Thought

Building your own OAuth integration is harder.

But it aligns the system the way Google’s model was originally designed:

the entity that builds the product is the one that is verified, audited, and accountable.

If you’re serious about handling user email data long-term, that alignment matters — not just for compliance, but for control, reliability, and trust.

See my earlier post and GIMAP option Gmail Access Evolution: From GIMAP to OAuth Restrictions to IMAP again

Top comments (0)