Notion Security with API and in General Use
Based on August Bradley's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.
Notion integrations expand the security attack surface by granting third-party apps read and write access to shared pages/databases.
Briefing
Notion’s API dramatically expands the security risk by granting third-party apps read and write access to specific parts of a workspace—so the key decision isn’t whether integrations are useful, but exactly who gets access and to what. Cloud platforms already carry inherent vulnerabilities because many features (like search) require systems to access your data rather than rely on end-to-end encryption. Adding integrations increases the “attack surface” further, since external developers can become a new pathway into sensitive information.
When an integration is installed in a Notion workspace, it receives read and write access to every page and database that the user explicitly shares with that integration. Sharing can happen through the share menu or via OAuth. Crucially, access isn’t limited to the single object shared: if a page is shared, the integration also gains access to that page’s children (sub-pages and related content). In addition, the integration can access a list of users and their email addresses within the workspace—meaning integrations can expose not only content but also workspace identity metadata.
The good news is that access can be scoped. Integrations are shared database-by-database or page-by-page, not automatically across the entire workspace. Still, the “children” rule means that selecting a page can unintentionally broaden access to nested content. The practical takeaway: users need to be deliberate and precise about what they share, especially when Notion is used as a life operating system storing personal, potentially confidential material.
Brand-name automation tools are presented as a relatively lower-risk starting point because their business models depend on integrations and they have incentives and resources to maintain security. The transcript specifically mentions Zapier and Make (spelled “automated i O” in the text), along with Typeform as examples of established companies with recognizable reputations. Even then, the guidance remains: users should still make their own risk assessment.
Independent developers raise the evaluation challenge. Without a widely known brand, it’s harder to judge who is behind an integration, what incentives they have, or how robust their security practices are. The suggested mitigation is to research reputation and activity in the Notion community—such as Twitter, the Notion subreddit, and the Facebook group “Notion Made Simple”—and to look for signals like ongoing engagement, public development, and community feedback. Another reliability and security proxy is business model clarity: paid plans can indicate a sustainable operation, while free tools may raise questions about how maintenance and incentives are handled.
Finally, the transcript draws a broader line for all cloud apps: users should decide what categories of data belong in a general-purpose workspace like Notion. Financial records and healthcare data are flagged as examples of information that many people should avoid storing in Notion unless the tool is built for high-security needs. Password managers such as 1Password are cited as an example of an app designed for security rather than expansive functionality, highlighting the trade-off between usability and protection. The overall message is to set a personal “data line,” apply it consistently across cloud services, and treat integration permissions as a deliberate security boundary rather than a convenience setting.
Cornell Notes
Notion’s API increases security risk because integrations can receive read and write access to the pages and databases a user shares. Integrations also gain access to workspace user lists and email addresses, and sharing a page automatically includes its children, which can unintentionally broaden access. While integrations can be limited database-by-database or page-by-page (not automatically across the whole workspace), the permissions still expand the attack surface beyond Notion itself. Established automation and form tools (e.g., Zapier, Make, Typeform) may be easier to trust due to resources and incentives, but independent developers require extra vetting. The transcript emphasizes drawing a personal line on what sensitive data belongs in cloud tools like Notion and using security-focused apps for high-risk categories.
What permissions does a Notion integration receive, and why does that matter?
How can users limit integration access in Notion?
Why does cloud functionality create security trade-offs even without integrations?
How should users think about risk when choosing integration providers?
What vetting steps are suggested for smaller Notion integration developers?
What kinds of data should generally be avoided in Notion, and what’s the alternative?
Review Questions
- If an integration is granted access to a shared page, what additional content might it automatically gain access to, and how could that affect your permissions strategy?
- What two categories of information does the transcript say integrations can access beyond the shared content itself?
- How do the transcript’s suggested vetting steps for independent developers differ from the approach for established integration brands?
Key Points
- 1
Notion integrations expand the security attack surface by granting third-party apps read and write access to shared pages/databases.
- 2
Sharing a page with an integration also grants access to that page’s children, so broad page shares can unintentionally widen exposure.
- 3
Integrations can access a workspace user list and email addresses, meaning identity metadata is part of the risk.
- 4
Integrations can be scoped database-by-database or page-by-page, but users must choose the smallest necessary objects to share.
- 5
Established integration brands (e.g., Zapier, Make, Typeform) may be easier to assess due to resources and aligned incentives, though users should still evaluate risk.
- 6
Independent developers require extra vetting using community reputation signals and business model indicators like paid plans.
- 7
A personal data “line” should guide what gets stored in Notion and other cloud apps; high-sensitivity categories may belong in dedicated security tools like 1Password instead.