Obsidian MCP Server
Enables MCP clients to interact with Obsidian vaults via filesystem operations and optional REST API integration for advanced UI commands. It features multi-vault auto-discovery, concurrent-safe file handling, and comprehensive tools for searching, reading, and managing vault content.
README
Obsidian MCP Server
Enables MCP clients (e.g., Claude Desktop) to interact with Obsidian vaults seamlessly.
Features
- Multi-Vault Support: Access unlimited Obsidian vaults without per-vault configuration
- Auto-Discovery: Automatically discovers REST API credentials from plugin configuration
- Concurrent-Safe: File locking prevents data corruption during simultaneous access
- Hybrid Access: Filesystem operations (always available) + REST API integration (optional)
- Security-First: Path validation, rate limiting, command allowlist, and secure credential handling
- Zero-Config: Works immediately with filesystem access; REST API features activate when plugin is installed
Installation
From Source (Current)
Currently, installation from source is required:
git clone <repository-url>
cd obsidian-mcp-server
npm install
npm run build
Via NPM (Coming Soon)
Once published to npm, you'll be able to install globally:
npm install -g obsidian-mcp-server
Note: The package is not yet published. Use "From Source" installation for now.
Quick Start
1. Basic Setup (Filesystem Access Only)
The server automatically detects and configures your Obsidian vaults on first run! No manual configuration needed.
What happens automatically:
- Config file is created at
~/.config/mcp-obsidian/config.json(macOS/Linux) or%APPDATA%/mcp-obsidian/config.json(Windows) - Server scans common locations (Documents, Dropbox, iCloud, etc.) for Obsidian vaults
- Discovered vault paths are automatically added to the configuration
- Ready to use immediately!
Common locations scanned:
~/Documents/Obsidian~/Dropboxand subdirectories~/Library/CloudStorage/Dropbox(macOS)~/Library/Mobile Documents/iCloud~md~obsidian(macOS)~/OneDrive/Documents/Obsidian(Windows)
Note: You can override the config location by setting the MCP_OBSIDIAN_CONFIG environment variable.
This enables immediate access to all discovered vaults using filesystem operations.
2. Enable REST API Features (Optional)
Install the Obsidian Local REST API plugin in your vault:
- Open Obsidian Settings → Community Plugins
- Browse and install "Local REST API"
- Enable the plugin
- The plugin will generate an API key automatically
No additional configuration needed - the server will auto-discover the credentials.
3. Connect to Claude
Add to your Claude Desktop configuration (~/Library/Application Support/Claude/claude_desktop_config.json on macOS):
{
"mcpServers": {
"obsidian": {
"command": "node",
"args": ["/path/to/obsidian-mcp-server/dist/index.js"]
}
}
}
Note: The env section is optional. If omitted, the server uses the default config location (~/.config/mcp-obsidian/config.json). Only add it if you want to use a custom config path:
{
"mcpServers": {
"obsidian": {
"command": "node",
"args": ["/path/to/obsidian-mcp-server/dist/index.js"],
"env": {
"MCP_OBSIDIAN_CONFIG": "/custom/path/to/config.json"
}
}
}
}
Restart Claude Desktop.
Configuration
Most users don't need to configure anything! The server auto-detects your vaults on first run.
Manual Configuration (Optional)
If you need to customize settings or add vaults in non-standard locations, edit ~/.config/mcp-obsidian/config.json:
Minimal Configuration:
{
"defaultVaultPath": "/Users/yourname/Documents/Obsidian"
}
Full Configuration:
See config.example.json for a complete configuration with all options:
- defaultVaultPath: Base directory containing your vaults
- vaults: Named vault mappings for easy access
- security: Path restrictions, rate limits, allowed hosts/ports
- features: File locking, caching, file watching settings
- logging: Log level and sensitive data sanitization
Named Vaults
For easier access, define named vaults in your config:
{
"defaultVaultPath": "/Users/yourname/Documents/Obsidian",
"vaults": {
"personal": "PersonalVault",
"work": "WorkVault"
}
}
Then reference them by name in Claude: "vault": "personal" instead of full paths.
Available Tools
File Operations
- list_vaults: List all accessible vaults
- get_vault_info: Get vault metadata (file count, plugin status)
- list_files: List files in a vault (supports recursive, hidden files)
- get_file: Read file content with optional frontmatter parsing
- write_file: Write or update files with conflict detection
- append_content: Append content to existing files
- search_files: Search with regex, case sensitivity, context
- get_metadata: Extract frontmatter, tags, links, word count
Obsidian Integration (Requires REST API Plugin)
- execute_command: Execute whitelisted Obsidian commands
- open_file: Open files in Obsidian UI
- get_active_file: Get currently active file
- open_graph: Open graph view
Allowed Commands
For security, only these Obsidian commands are allowed:
graph:open,graph:open-localeditor:toggle-sourceapp:go-back,app:go-forwardglobal-search:openworkspace:new-file,file-explorer:reveal-active-fileworkspace:split-vertical,workspace:split-horizontal
Testing
Test with Claude Desktop
- Restart Claude Desktop after configuration
- Open a conversation and try:
List my Obsidian vaults
Expected response: List of discovered vaults with metadata.
Read the file "Daily Notes/2026-01-14.md" from my Personal vault
Expected response: File content with metadata.
Search for "project" in my Work vault
Expected response: Search results with context.
Test with MCP Inspector
npx @modelcontextprotocol/inspector dist/index.js
This opens a web interface to test all tools interactively.
Verify File Locking
Open a file in Obsidian and simultaneously have Claude read/write it. The server will handle concurrent access safely with file locking.
Verify Auto-Discovery
Install the REST API plugin in a vault, then:
Get info about my Personal vault
Expected response should include "hasRestApi": true and "pluginVersion": "1.x.x".
Architecture
Hybrid Provider System
Operation Request
↓
Router Decision
↓
┌───┴───┐
↓ ↓
Filesystem REST API
Provider Provider
↓ ↓
Direct Plugin
File I/O Commands
- Filesystem Provider: Always available, handles read/write/search
- REST API Provider: Optional, handles UI integration and commands
- Operation Router: Intelligently selects the appropriate provider
Security Layers
- Path Validation: Prevents directory traversal, validates symlinks
- Rate Limiting: Global, per-vault, and per-operation limits
- Command Allowlist: Only whitelisted Obsidian commands allowed
- Credential Security: Memory-only cache, no disk serialization
Concurrent Access Handling
- File Locking: Read locks (shared) and write locks (exclusive)
- Conflict Detection: Timestamp verification before writes
- Atomic Writes: Write to temp file, then rename
- Lock Timeout: Automatic cleanup of expired locks
Troubleshooting
Vaults Not Found
Problem: list_vaults returns empty array
Solutions:
- First check: Restart Claude Desktop to trigger auto-detection
- Verify
defaultVaultPathin config points to correct directory - Ensure vaults have
.obsidiandirectory (valid Obsidian vaults) - Check
security.allowedVaultPathsincludes the vault location - If your vaults are in a non-standard location, manually add the path to
allowedVaultPathsin the config
REST API Features Not Working
Problem: "REST API required but plugin not installed"
Solutions:
- Install "Local REST API" plugin in Obsidian
- Enable the plugin in Obsidian settings
- Verify plugin created
data.jsonin.obsidian/plugins/obsidian-local-rest-api/ - Clear credential cache: restart the MCP server
File Lock Timeout
Problem: "Could not acquire write lock"
Solutions:
- Close files in Obsidian that are being edited
- Wait for ongoing operations to complete
- Increase
features.fileLocking.timeoutin config - Check for stuck locks: restart the server
Rate Limit Exceeded
Problem: "Rate limit exceeded"
Solutions:
- Wait before retrying
- Increase rate limits in config if legitimate usage
- Check for loops in your Claude interactions
Permission Denied
Problem: "Vault path not in allowed directories"
Solutions:
- First try: Delete
~/.config/mcp-obsidian/config.jsonand restart to trigger auto-detection - Manually add vault path to
security.allowedVaultPathsin the config - Use absolute paths, not relative paths
- Check symlink targets are also in allowed paths
- Ensure the path exists and is accessible
Security Considerations
Threat Model
This server operates locally and assumes:
- The local machine is trusted
- Claude Desktop is trusted
- Only you have access to the MCP server process
Protections Implemented
- Path Traversal Prevention: Rejects
..and~patterns, validates all paths - API Key Security: Credentials stored only in memory, never logged
- Command Injection Prevention: Explicit allowlist of safe commands only
- Rate Limiting: Prevents abuse and DoS scenarios
- Symlink Validation: Resolves and validates symlink targets
- Host/Port Validation: Only localhost connections allowed
What This Does NOT Protect Against
- Malicious code in your Obsidian vault (markdown files can't execute code)
- Attacks on Obsidian itself
- Physical access to your machine
- Compromised Claude Desktop application
Development
Build
npm run build
Watch Mode
npm run watch
Run Tests
npm test
Lint
npm run lint
Contributing
Contributions welcome! Please:
- Follow existing code style (TypeScript, ESLint, Prettier)
- Add tests for new features
- Update documentation
- Ensure security best practices
License
MIT
Support
For issues, questions, or feature requests, please open an issue on the repository.
Credits
Built with:
- Model Context Protocol SDK
- gray-matter for frontmatter parsing
- axios for HTTP requests
Recommended Servers
playwright-mcp
A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.
Magic Component Platform (MCP)
An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.
Audiense Insights MCP Server
Enables interaction with Audiense Insights accounts via the Model Context Protocol, facilitating the extraction and analysis of marketing insights and audience data including demographics, behavior, and influencer engagement.
VeyraX MCP
Single MCP tool to connect all your favorite tools: Gmail, Calendar and 40 more.
Kagi MCP Server
An MCP server that integrates Kagi search capabilities with Claude AI, enabling Claude to perform real-time web searches when answering questions that require up-to-date information.
graphlit-mcp-server
The Model Context Protocol (MCP) Server enables integration between MCP clients and the Graphlit service. Ingest anything from Slack to Gmail to podcast feeds, in addition to web crawling, into a Graphlit project - and then retrieve relevant contents from the MCP client.
Qdrant Server
This repository is an example of how to create a MCP server for Qdrant, a vector search engine.
Neon Database
MCP server for interacting with Neon Management API and databases
Exa Search
A Model Context Protocol (MCP) server lets AI assistants like Claude use the Exa AI Search API for web searches. This setup allows AI models to get real-time web information in a safe and controlled way.
E2B
Using MCP to run code via e2b.