Obsidian MCP Server
MCP ServerFreeSearch, read, and write Obsidian vault notes via MCP.
Capabilities11 decomposed
mcp protocol-compliant tool exposure for obsidian vaults
Medium confidenceImplements the Model Context Protocol server specification to expose read_notes and search_notes tools to MCP clients like Claude Desktop. The server initializes with protocol-compliant tool definitions, handles tool discovery requests via MCP's tools/list endpoint, and routes tool execution calls through a standardized request-response cycle. This enables any MCP-compatible client to discover and invoke vault operations without custom integration code.
Implements full MCP server lifecycle (initialization, tool discovery, execution routing) with explicit Tool Registry pattern that decouples tool definitions from implementation, enabling extensibility without modifying core server code
Native MCP implementation provides zero-friction integration with Claude Desktop compared to REST API wrappers or custom plugin development
glob-pattern-based markdown file search with path validation
Medium confidenceProvides a search_notes tool that accepts glob patterns (e.g., '*.md', 'projects/*.md') and returns matching file paths from the vault. The implementation validates search patterns against the configured vault root directory using a Path Validator component that prevents directory traversal attacks. Search results are returned as a list of relative paths, enabling clients to subsequently read matched files via the read_notes tool.
Combines glob-based pattern matching with Path Validator security layer that validates every search operation against vault boundaries, preventing directory traversal while maintaining glob expressiveness
Simpler and faster than full-text search for pattern-based discovery; more flexible than hardcoded folder navigation but without the complexity of regex or semantic search
relative path-based file addressing within vault
Medium confidenceAll file operations use paths relative to the vault root directory rather than absolute filesystem paths. This abstraction isolates clients from the vault's physical location on disk and enables vault portability — the same relative paths work regardless of where the vault directory is mounted. Paths are normalized and validated to ensure they remain within vault boundaries before filesystem access.
Uses vault-relative path abstraction with validation and normalization, enabling portable vault references while maintaining security boundaries through path validation
More portable than absolute paths because vault location is transparent to clients; more secure than allowing absolute paths because it enforces vault boundary constraints
secure file content retrieval with path validation and traversal prevention
Medium confidenceImplements the read_notes tool that accepts one or more file paths relative to the vault root and returns their Markdown contents. The Path Validator component validates each requested path before reading, enforcing vault boundary constraints and blocking directory traversal attempts using '../' or absolute paths. File contents are read from disk and returned as plain text, preserving Markdown formatting for client-side rendering.
Path Validator component implements multi-layer security: validates paths remain within vault directory, blocks directory traversal patterns, validates symlinks, and checks for hidden files — all before filesystem access occurs
More secure than naive file reading because validation happens before filesystem operations; faster than Obsidian API for bulk reads because it bypasses Obsidian's UI layer and reads directly from disk
path validation and directory traversal attack prevention
Medium confidenceImplements a dedicated Path Validator security component that intercepts all file operations (read_notes and search_notes) and enforces vault boundary constraints. The validator checks for directory traversal patterns ('../', absolute paths), validates symlink targets remain within vault, detects hidden files/directories, and ensures all operations stay within the configured vault root. This security layer is applied before any filesystem operation executes, preventing unauthorized access to files outside the vault.
Implements multi-layer validation strategy: path normalization, boundary checking, symlink resolution, and hidden file detection — all executed before filesystem operations, creating a security perimeter rather than reactive filtering
More comprehensive than simple string matching because it handles symlinks and normalized paths; more efficient than OS-level permissions because validation happens in-process without system calls
markdown file system indexing and discovery
Medium confidenceProvides filesystem-level indexing of Markdown files within the vault directory, enabling rapid file discovery without parsing file contents. The system scans the vault directory structure, identifies all .md files, and maintains their relative paths for use by search_notes and read_notes tools. This indexing is performed on-demand during search operations rather than pre-computed, avoiding stale index issues but incurring filesystem traversal cost.
Uses on-demand filesystem traversal with glob pattern matching rather than pre-computed indexes, trading indexing latency for index freshness and eliminating synchronization overhead
Simpler than maintaining a separate index database because filesystem is the source of truth; slower than pre-computed indexes but avoids stale index problems
obsidian vault configuration and directory binding
Medium confidenceEnables configuration of the MCP server to bind to a specific Obsidian vault directory or any directory containing Markdown files. The server accepts a vault path parameter during initialization, validates it exists and is readable, and uses it as the root for all subsequent file operations. This configuration is typically set via Smithery CLI or VS Code settings JSON, allowing users to point the server at their vault without code changes.
Supports both Obsidian vaults and generic Markdown directories through the same configuration interface, with path validation occurring at server startup rather than per-operation
More flexible than hardcoded vault paths because configuration is externalized; simpler than multi-vault support because single vault per instance reduces state complexity
smithery cli-based server installation and registration
Medium confidenceProvides automated installation of the mcp-obsidian server into Claude Desktop via the Smithery CLI tool. The installation process downloads the server package, registers it with Claude Desktop's MCP configuration, and sets up the vault path binding. This is the recommended installation method and abstracts away manual configuration file editing, making the server accessible to non-technical users.
Abstracts MCP server registration into a single CLI command that modifies Claude Desktop's configuration files, eliminating manual JSON editing and making installation accessible to non-developers
More user-friendly than manual configuration because it automates file discovery and registration; more reliable than manual setup because it validates configuration syntax
vs code mcp extension integration and one-click installation
Medium confidenceProvides VS Code integration via MCP extension badges and manual configuration through VS Code settings JSON. Users can click installation badges in the repository README or manually add the server configuration to their VS Code MCP settings. This enables VS Code users to access Obsidian vaults through the MCP extension without using Claude Desktop, supporting alternative MCP clients.
Provides both one-click badge installation and manual JSON configuration, supporting both GUI-first and configuration-file-first workflows for VS Code users
More flexible than Smithery CLI because it supports any MCP client with VS Code integration; more accessible than pure CLI because badges enable one-click installation
markdown content preservation and raw file reading
Medium confidenceReads Markdown files from disk and returns their raw content without parsing, transformation, or interpretation. The read_notes tool preserves all Markdown syntax, frontmatter, and formatting exactly as stored in the vault. This approach enables clients to handle Markdown rendering and interpretation themselves, supporting diverse use cases from plain text processing to semantic parsing.
Returns raw Markdown without interpretation or transformation, delegating all parsing and rendering to clients — this preserves Obsidian-specific syntax and enables diverse downstream processing
More flexible than pre-rendered HTML because clients can apply custom parsing; more faithful to source than interpreted content because no information is lost in translation
multi-file batch content retrieval in single request
Medium confidenceThe read_notes tool accepts an array of file paths and returns contents of multiple files in a single MCP request, reducing round-trip overhead compared to sequential single-file reads. The implementation validates each path independently, reads all files, and returns results as an array or object mapping paths to contents. This enables efficient context assembly for AI agents that need multiple related notes.
Supports batch file reading in a single MCP call, reducing protocol overhead and enabling efficient context assembly without requiring clients to implement sequential request loops
More efficient than sequential single-file reads because it reduces MCP protocol round-trips; simpler than implementing client-side batching logic because the server handles parallelization
Capabilities are decomposed by AI analysis. Each maps to specific user intents and improves with match feedback.
Related Artifactssharing capabilities
Artifacts that share capabilities with Obsidian MCP Server, ranked by overlap. Discovered automatically through the match graph.
obsidian-mcp-server
Obsidian Knowledge-Management MCP (Model Context Protocol) server that enables AI agents and development tools to interact with an Obsidian vault. It provides a comprehensive suite of tools for reading, writing, searching, and managing notes, tags, and frontmatter, acting as a bridge to the Obsidian
mcp-obsidian
Model Context Protocol server for Obsidian Vaults
Obsidian
** - Interacting with Obsidian via REST API
@adisuryanathanael/mcp-server-filesystem2
MCP-compatible server tool for filesystem access from https://github.com/adisuryanathan/modelcontextprotocol-servers.git
@kakedashi/md-to-article-mcp
MCP tool to convert Markdown files to rich text and copy to clipboard for X Article editor
mcp-server-qdrant
An official Qdrant Model Context Protocol (MCP) server implementation
Best For
- ✓Claude Desktop users managing personal knowledge bases
- ✓Teams building MCP-compatible AI applications
- ✓Developers integrating Obsidian with LLM agents
- ✓Users with organized vault structures using consistent naming patterns
- ✓AI agents building context dynamically based on search results
- ✓Knowledge base systems requiring pattern-based note discovery
- ✓Teams sharing vaults across different machines
- ✓Portable vault configurations
Known Limitations
- ⚠MCP protocol overhead adds ~50-100ms per tool invocation for protocol serialization
- ⚠Limited to tools explicitly registered in the Tool Registry — no dynamic tool generation
- ⚠Requires MCP client to support tool calling; older clients cannot use this capability
- ⚠Glob patterns only — no regex or full-text search capabilities
- ⚠Search results limited to file paths; no metadata or preview content included
- ⚠Performance degrades with very large vaults (10,000+ files) due to filesystem traversal
Requirements
Input / Output
UnfragileRank
UnfragileRank is computed from adoption signals, documentation quality, ecosystem connectivity, match graph feedback, and freshness. No artifact can pay for a higher rank.
About
Community MCP server for Obsidian knowledge base. Provides tools to search notes, read and write markdown files, manage tags, and navigate the vault's internal link graph structure.
Categories
Alternatives to Obsidian MCP Server
Are you the builder of Obsidian MCP Server?
Claim this artifact to get a verified badge, access match analytics, see which intents users search for, and manage your listing.
Get the weekly brief
New tools, rising stars, and what's actually worth your time. No spam.
Data Sources
Looking for something else?
Search →