How Ooty Protects Your Marketing Data
Your credentials never leave our servers. Here's how Ooty's proxy architecture keeps your marketing accounts safe, and the trade-offs we've made.
By Finn Hartley
When you connect ChatGPT, Gemini, or Claude to your Google Analytics account through Ooty, your Google password never touches our systems. Neither does your Meta login, your Amazon credentials, or any other platform password.
We use OAuth, the same authentication flow that Google, Meta, and Amazon use for every third-party app you've ever connected. You approve access on their consent screen, they send us a token, and that token is all we ever see.
This post explains how we protect those tokens, what we store and don't store, and the trade-offs we've made. Including the ones that aren't in our favour.
The problem with most AI marketing tools
Most MCP tools that connect AI assistants to marketing platforms ask you to manage your own API keys. Your Google API key, your Meta app secret, your Amazon credentials, all sitting in a config file on your laptop.
For developers, this is a reasonable trade-off. For marketing teams, it's a serious problem.
API keys in local config files are:
- Accessible to any process running on your machine
- Regularly committed to git repos by accident (over 12.8 million secrets were detected in public GitHub commits in 2023, GitGuardian, 2024)
- At risk when your laptop is shared, lost, stolen, or compromised
- Your responsibility to rotate, revoke, and keep safe
Some tools go further in the wrong direction. They store credentials in plaintext configuration files with no encryption at all. If someone gets access to that file, they have your marketing accounts.
Ooty takes a different approach entirely.
Your credentials stay on our servers
How Your Data Stays Protected
Your credentials never reach your machine. Data flows through Ooty without being stored.
Your Machine
Zone 1
Your AI assistant
A license key(revocable any time)
No API credentials(ever)
Ooty Servers
Zone 2
Validates your identity
Retrieves your encrypted credentials
Calls the platform API on your behalf
Data passes through, nothing stored
Marketing Platforms
Zone 3
Google, Meta, Amazon, YouTube
Connected via OAuth(minimum scopes)
Credentials encrypted at rest
Your API credentials never leave Zone 2. They are encrypted at rest, decrypted only for the instant of each request, and never sent to your machine.
Here's the short version: your marketing credentials never exist on your machine. Not in a config file, not in memory, not anywhere.
When you ask your AI assistant a question like "What were my top traffic sources last month?", here's what happens:
Product Lead at Ooty. Writes about MCP architecture, security, and developer tooling.
Continue reading
What Is MCP? The Protocol That Connects AI to Your Marketing Data
Most marketing teams use AI the same way: copy data from one dashboard, paste it into ChatGPT, Gemini, or Claude, ask a question, and hope the answer is useful. The AI does its best with a screenshot or a CSV export, but it is working with a snapshot, not your
MCP Security: 10 Things That Actually Matter
MCP is moving from experimental to production fast. AI assistants connected to live APIs, databases, and third-party services are no longer a proof-of-concept. They're running in companies of all sizes, handling real data, right now. The security model for MCP
Introducing Ploti: Free Interactive Charts for Any AI Assistant
Charts have always lived outside AI conversations. You run an analysis, get a table of numbers, and then open a separate tool to visualize it. Ploti changes that. It is a free, open-source MCP server that renders 43 chart types as interactive widgets directly