Get AI summaries of any video or article — Sign up free
Notion Security with API and in General Use thumbnail

Notion Security with API and in General Use

August Bradley·
5 min read

Based on August Bradley's video on YouTube. If you like this content, support the original creators by watching, liking and subscribing to their content.

TL;DR

Notion integrations expand the security attack surface by granting third-party apps read and write access to shared pages/databases.

Briefing

Notion’s API dramatically expands the security risk by granting third-party apps read and write access to specific parts of a workspace—so the key decision isn’t whether integrations are useful, but exactly who gets access and to what. Cloud platforms already carry inherent vulnerabilities because many features (like search) require systems to access your data rather than rely on end-to-end encryption. Adding integrations increases the “attack surface” further, since external developers can become a new pathway into sensitive information.

When an integration is installed in a Notion workspace, it receives read and write access to every page and database that the user explicitly shares with that integration. Sharing can happen through the share menu or via OAuth. Crucially, access isn’t limited to the single object shared: if a page is shared, the integration also gains access to that page’s children (sub-pages and related content). In addition, the integration can access a list of users and their email addresses within the workspace—meaning integrations can expose not only content but also workspace identity metadata.

The good news is that access can be scoped. Integrations are shared database-by-database or page-by-page, not automatically across the entire workspace. Still, the “children” rule means that selecting a page can unintentionally broaden access to nested content. The practical takeaway: users need to be deliberate and precise about what they share, especially when Notion is used as a life operating system storing personal, potentially confidential material.

Brand-name automation tools are presented as a relatively lower-risk starting point because their business models depend on integrations and they have incentives and resources to maintain security. The transcript specifically mentions Zapier and Make (spelled “automated i O” in the text), along with Typeform as examples of established companies with recognizable reputations. Even then, the guidance remains: users should still make their own risk assessment.

Independent developers raise the evaluation challenge. Without a widely known brand, it’s harder to judge who is behind an integration, what incentives they have, or how robust their security practices are. The suggested mitigation is to research reputation and activity in the Notion community—such as Twitter, the Notion subreddit, and the Facebook group “Notion Made Simple”—and to look for signals like ongoing engagement, public development, and community feedback. Another reliability and security proxy is business model clarity: paid plans can indicate a sustainable operation, while free tools may raise questions about how maintenance and incentives are handled.

Finally, the transcript draws a broader line for all cloud apps: users should decide what categories of data belong in a general-purpose workspace like Notion. Financial records and healthcare data are flagged as examples of information that many people should avoid storing in Notion unless the tool is built for high-security needs. Password managers such as 1Password are cited as an example of an app designed for security rather than expansive functionality, highlighting the trade-off between usability and protection. The overall message is to set a personal “data line,” apply it consistently across cloud services, and treat integration permissions as a deliberate security boundary rather than a convenience setting.

Cornell Notes

Notion’s API increases security risk because integrations can receive read and write access to the pages and databases a user shares. Integrations also gain access to workspace user lists and email addresses, and sharing a page automatically includes its children, which can unintentionally broaden access. While integrations can be limited database-by-database or page-by-page (not automatically across the whole workspace), the permissions still expand the attack surface beyond Notion itself. Established automation and form tools (e.g., Zapier, Make, Typeform) may be easier to trust due to resources and incentives, but independent developers require extra vetting. The transcript emphasizes drawing a personal line on what sensitive data belongs in cloud tools like Notion and using security-focused apps for high-risk categories.

What permissions does a Notion integration receive, and why does that matter?

An integration added to a Notion workspace gets read and write access to all pages/databases that are explicitly shared with it—either via the share menu or through OAuth. If a page is shared, the integration also receives access to that page’s children (sub-pages and related content). It also receives access to a read list of users and their emails in the workspace. That combination matters because integrations can expose both content and identity metadata, and write access means a compromised integration could alter data, not just view it.

How can users limit integration access in Notion?

Access can be scoped database-by-database or page-by-page. The transcript stresses that integrations are not automatically granted access to the entire workspace; users choose specific databases/pages to share. However, the “children of those pages” rule means sharing a parent page can effectively share more than expected. The safest approach is to share only the smallest necessary database(s) and avoid broad page shares when nested content is sensitive.

Why does cloud functionality create security trade-offs even without integrations?

The transcript argues that cloud platforms generally aren’t end-to-end encrypted when they provide high-functionality features. Search is used as an example: systems need access to your data to generate search results. As a result, even well-protected cloud services still carry some vulnerability surface unless end-to-end encryption is used end-to-end—which often conflicts with advanced features.

How should users think about risk when choosing integration providers?

For large, established brands like Zapier, Make, and Typeform, the transcript suggests risk may be relatively lower because their business models depend on integrations and they likely have resources and incentives to maintain security. For smaller or independent developers, evaluation is harder: users may not know who is behind the integration or how it’s funded. The transcript recommends conservative decision-making and additional vetting for independent developers.

What vetting steps are suggested for smaller Notion integration developers?

The transcript recommends checking whether developers are active and reputable in the Notion community, where many share progress publicly and solicit feedback. Suggested places include Twitter, the Notion subreddit, and the Facebook group “Notion Made Simple.” It also recommends looking for evidence of a real business model—such as paid plans—as a signal that the developer has incentives to maintain the integration and is less likely to disappear after launching a free tool.

What kinds of data should generally be avoided in Notion, and what’s the alternative?

The transcript advises drawing a line on what belongs in cloud apps. It flags financial records and healthcare records as examples of data many people should not store in Notion, especially if it’s not built for hardcore security. It cites 1Password as an example of a security-focused app (built for protection rather than broad functionality). The underlying point is that some data may be better kept in a locked drawer or in a dedicated security tool.

Review Questions

  1. If an integration is granted access to a shared page, what additional content might it automatically gain access to, and how could that affect your permissions strategy?
  2. What two categories of information does the transcript say integrations can access beyond the shared content itself?
  3. How do the transcript’s suggested vetting steps for independent developers differ from the approach for established integration brands?

Key Points

  1. 1

    Notion integrations expand the security attack surface by granting third-party apps read and write access to shared pages/databases.

  2. 2

    Sharing a page with an integration also grants access to that page’s children, so broad page shares can unintentionally widen exposure.

  3. 3

    Integrations can access a workspace user list and email addresses, meaning identity metadata is part of the risk.

  4. 4

    Integrations can be scoped database-by-database or page-by-page, but users must choose the smallest necessary objects to share.

  5. 5

    Established integration brands (e.g., Zapier, Make, Typeform) may be easier to assess due to resources and aligned incentives, though users should still evaluate risk.

  6. 6

    Independent developers require extra vetting using community reputation signals and business model indicators like paid plans.

  7. 7

    A personal data “line” should guide what gets stored in Notion and other cloud apps; high-sensitivity categories may belong in dedicated security tools like 1Password instead.

Highlights

Integrations don’t just read what you share—they can also write, and they inherit access to a shared page’s children.
Even when access is limited to specific databases/pages, integrations can still expose workspace user emails.
Cloud search and other advanced features typically require access to data, which conflicts with end-to-end encryption.
Paid plans and active community presence are offered as practical signals for assessing smaller integration developers.
The transcript draws a clear boundary: financial and healthcare data often shouldn’t live in general-purpose tools like Notion.

Topics

  • Notion API Security
  • Integration Permissions
  • OAuth Access
  • Cloud Encryption Trade-offs
  • Third-Party Developer Risk

Mentioned