Features | Installation | Configuration | Troubleshooting | Security | Development | Support
MCP Tools for Obsidian enables AI applications like Claude Desktop to securely access and work with your Obsidian vault through the Model Context Protocol (MCP). MCP is an open protocol that standardizes how AI applications can interact with external data sources and tools while maintaining security and user control. [^2]
This plugin consists of two parts:
An Obsidian plugin that adds MCP capabilities to your vault
A local MCP server that handles communication with AI applications
When you install this plugin, it will help you set up both components. The MCP server acts as a secure bridge between your vault and AI applications like Claude Desktop. This means AI assistants can read your notes, execute templates, and perform semantic searches - but only when you allow it and only through the server's secure API. The server never gives AI applications direct access to your vault files. [^3]
Privacy Note: When using Claude Desktop with this plugin, your conversations with Claude are not used to train Anthropic's models by default. [^1]
Features
When connected to an MCP client like Claude Desktop, this plugin enables:
Vault Access: Allows AI assistants to read and reference your notes while maintaining your vault's security [^4]
Semantic Search: AI assistants can search your vault based on meaning and context, not just keywords [^5]
Template Integration: Execute Obsidian templates through AI interactions, with dynamic parameters and content generation [^6]
All features require an MCP-compatible client like Claude Desktop, as this plugin provides the server component that enables these integrations. The plugin does not modify Obsidian's functionality directly - instead, it creates a secure bridge that allows AI applications to work with your vault in powerful ways.
[!Important]
This plugin requires a secure server component that runs locally on your computer. The server is distributed as a signed executable, with its complete source code available in packages/mcp-server/. For details about our security measures and code signing process, see the Security section.
Install the plugin from Obsidian's Community Plugins
Enable the plugin in Obsidian settings
Open the plugin settings
Click "Install Server" to download and configure the MCP server
Clicking the install button will:
Download the appropriate MCP server binary for your platform
Configure Claude Desktop to use the server
Set up necessary permissions and paths
Installation Locations
Server Binary: {vault}/.obsidian/plugins/obsidian-mcp-tools/bin/
Log Files:
Configuration
After clicking the "Install Server" button in the plugin settings, the plugin will automatically:
Download the appropriate MCP server binary
Use your Local REST API plugin's API key
Configure Claude Desktop to use the MCP server
Set up appropriate paths and permissions
While the configuration process is automated, it requires your explicit permission to install the server binary and modify the Claude Desktop configuration. No additional manual configuration is required beyond this initial setup step.
Troubleshooting
If you encounter issues:
Check the plugin settings to verify:
Review the logs:
Common Issues:
Security
Binary Distribution
All releases are built using GitHub Actions with reproducible builds
Binaries are signed and attested using SLSA provenance
Release workflows are fully auditable in the repository
Runtime Security
The MCP server runs with minimal required permissions
All communication is encrypted
API keys are stored securely using platform-specific credential storage
Binary Verification
The MCP server binaries are published with SLSA Provenance attestations, which provide cryptographic proof of where and how the binaries were built. This helps ensure the integrity and provenance of the binaries you download.
To verify a binary using the GitHub CLI:
Install GitHub CLI:
Verify the binary:
The verification will show:
The binary's SHA256 hash
Confirmation that it was built by this repository's GitHub Actions workflows
The specific workflow file and version tag that created it
Compliance with SLSA Level 3 build requirements
This verification ensures the binary hasn't been tampered with and was built directly from this repository's source code.
Reporting Security Issues
Please report security vulnerabilities via our security policy.
Do not report security vulnerabilities in public issues.
Development
This project uses a monorepo structure with feature-based architecture. For detailed project architecture documentation, see .clinerules.
Using Cline
Some code in this project was implemented using the AI coding agent Cline. Cline uses cline_docs/ and the .clinerules file to understand project architecture and patterns when implementing new features.
See CHANGELOG.md for a list of changes in each release.
License
MIT License
Footnotes
[^1]: For information about Claude data privacy and security, see Claude AI's data usage policy
[^2]: For more information about the Model Context Protocol, see MCP Introduction
[^3]: For a list of available MCP Clients, see MCP Example Clients
[^4]: Requires Obsidian plugin Local REST API
[^5]: Requires Obsidian plugin Smart Connections
[^6]: Requires Obsidian plugin Templater
Features | Installation | Configuration | Troubleshooting | Security | Development | Support
MCP Tools for Obsidian enables AI applications like Claude Desktop to securely access and work with your Obsidian vault through the Model Context Protocol (MCP). MCP is an open protocol that standardizes how AI applications can interact with external data sources and tools while maintaining security and user control. [^2]
This plugin consists of two parts:
An Obsidian plugin that adds MCP capabilities to your vault
A local MCP server that handles communication with AI applications
When you install this plugin, it will help you set up both components. The MCP server acts as a secure bridge between your vault and AI applications like Claude Desktop. This means AI assistants can read your notes, execute templates, and perform semantic searches - but only when you allow it and only through the server's secure API. The server never gives AI applications direct access to your vault files. [^3]
Privacy Note: When using Claude Desktop with this plugin, your conversations with Claude are not used to train Anthropic's models by default. [^1]
Features
When connected to an MCP client like Claude Desktop, this plugin enables:
Vault Access: Allows AI assistants to read and reference your notes while maintaining your vault's security [^4]
Semantic Search: AI assistants can search your vault based on meaning and context, not just keywords [^5]
Template Integration: Execute Obsidian templates through AI interactions, with dynamic parameters and content generation [^6]
All features require an MCP-compatible client like Claude Desktop, as this plugin provides the server component that enables these integrations. The plugin does not modify Obsidian's functionality directly - instead, it creates a secure bridge that allows AI applications to work with your vault in powerful ways.
[!Important]
This plugin requires a secure server component that runs locally on your computer. The server is distributed as a signed executable, with its complete source code available in packages/mcp-server/. For details about our security measures and code signing process, see the Security section.
Install the plugin from Obsidian's Community Plugins
Enable the plugin in Obsidian settings
Open the plugin settings
Click "Install Server" to download and configure the MCP server
Clicking the install button will:
Download the appropriate MCP server binary for your platform
Configure Claude Desktop to use the server
Set up necessary permissions and paths
Installation Locations
Server Binary: {vault}/.obsidian/plugins/obsidian-mcp-tools/bin/
Log Files:
Configuration
After clicking the "Install Server" button in the plugin settings, the plugin will automatically:
Download the appropriate MCP server binary
Use your Local REST API plugin's API key
Configure Claude Desktop to use the MCP server
Set up appropriate paths and permissions
While the configuration process is automated, it requires your explicit permission to install the server binary and modify the Claude Desktop configuration. No additional manual configuration is required beyond this initial setup step.
Troubleshooting
If you encounter issues:
Check the plugin settings to verify:
Review the logs:
Common Issues:
Security
Binary Distribution
All releases are built using GitHub Actions with reproducible builds
Binaries are signed and attested using SLSA provenance
Release workflows are fully auditable in the repository
Runtime Security
The MCP server runs with minimal required permissions
All communication is encrypted
API keys are stored securely using platform-specific credential storage
Binary Verification
The MCP server binaries are published with SLSA Provenance attestations, which provide cryptographic proof of where and how the binaries were built. This helps ensure the integrity and provenance of the binaries you download.
To verify a binary using the GitHub CLI:
Install GitHub CLI:
Verify the binary:
The verification will show:
The binary's SHA256 hash
Confirmation that it was built by this repository's GitHub Actions workflows
The specific workflow file and version tag that created it
Compliance with SLSA Level 3 build requirements
This verification ensures the binary hasn't been tampered with and was built directly from this repository's source code.
Reporting Security Issues
Please report security vulnerabilities via our security policy.
Do not report security vulnerabilities in public issues.
Development
This project uses a monorepo structure with feature-based architecture. For detailed project architecture documentation, see .clinerules.
Using Cline
Some code in this project was implemented using the AI coding agent Cline. Cline uses cline_docs/ and the .clinerules file to understand project architecture and patterns when implementing new features.
See CHANGELOG.md for a list of changes in each release.
License
MIT License
Footnotes
[^1]: For information about Claude data privacy and security, see Claude AI's data usage policy
[^2]: For more information about the Model Context Protocol, see MCP Introduction
[^3]: For a list of available MCP Clients, see MCP Example Clients
[^4]: Requires Obsidian plugin Local REST API
[^5]: Requires Obsidian plugin Smart Connections
[^6]: Requires Obsidian plugin Templater