obsidian-mcp-plugin

aaronsb/obsidian-mcp-plugin

3.5

If you are the rightful owner of obsidian-mcp-plugin and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.

The Obsidian MCP Plugin is a high-performance server that integrates Model Context Protocol capabilities directly into Obsidian, providing AI tools with direct vault access through HTTP transport.

Tools
6
Resources
0
Prompts
0

Obsidian MCP Plugin

πŸ“‹ Community Plugin Status: This plugin is currently under review for inclusion in the Obsidian Community Plugins directory. Submitted on July 10, 2025 - PR #6991

A high-performance Model Context Protocol (MCP) server implemented as an Obsidian plugin, providing AI tools with direct vault access through HTTP transport.

Overview

This plugin brings MCP capabilities directly into Obsidian, eliminating the need for external servers or the REST API plugin. It provides semantic, AI-optimized operations that consolidate multiple tools into intelligent workflows with contextual hints.

What are "Semantic Tools"?

Unlike basic tools that just return data, semantic tools are self-guiding. When an AI agent uses a semantic tool, it doesn't just get the requested informationβ€”it also receives smart suggestions about what to do next. This creates a natural workflow where each action leads intelligently to the next, helping AI agents complete complex tasks without getting stuck or needing constant human guidance.

Example: When searching for a file, a semantic tool doesn't just return search results. It also suggests: "Found 3 files matching 'meeting notes'. Consider using view to read the most recent one, or graph traverse to explore related documents."

Obsidian MCP Plugin Settings

Key Features

  • Direct Obsidian Integration: Runs natively within Obsidian for maximum performance
  • HTTP MCP Transport: Compatible with Claude Desktop, Claude Code, Cline, and other MCP clients
  • Semantic Operations: Enhanced search with Obsidian operators, intelligent fragment retrieval, and workflow guidance
  • No External Dependencies: No need for the REST API plugin or external servers
  • High Performance: Sub-100ms response times with direct vault access
  • Concurrent Sessions: Support for multiple AI agents working simultaneously (v0.5.8+)
  • Worker Thread Processing: CPU-intensive operations run in parallel threads for non-blocking performance
  • Path Exclusions: .mcpignore file support for blocking sensitive files from AI access
  • Cloud Sync Friendly: Smart retry logic handles file sync delays from iCloud, OneDrive, Dropbox, and other services

πŸ” Path Exclusions with .mcpignore

Protect sensitive files and directories from AI access using .gitignore-style patterns.

Overview

The plugin supports a .mcpignore file in your vault root that allows you to exclude specific files and directories from MCP operations. This provides a security layer ensuring that AI tools cannot access your private or sensitive content.

Setup

  1. Enable in Settings: Toggle "Enable Path Exclusions (.mcpignore)" in plugin settings
  2. Create Template: Click "Create Template" to generate a starter .mcpignore file with examples
  3. Edit Patterns: Use any text editor to add exclusion patterns

Pattern Syntax

The .mcpignore file uses the same syntax as .gitignore:

# Directories
private/              # Excludes 'private' directory and ALL its contents
/private/            # Only excludes 'private' at vault root
work/*/confidential/ # Excludes 'confidential' dirs one level under work/

# Files
secrets.md           # Excludes this specific file
*.private           # All files ending with .private
daily/*.md          # All .md files directly in daily/

# Negation (whitelist)
!public.private     # Allow this specific file despite *.private rule

Features

  • Auto-reload: Changes to .mcpignore take effect immediately
  • Context Menu: Right-click any file/folder and select "Add to .mcpignore"
  • UI Controls: Manage from plugin settings with quick access buttons
  • Security: Blocked paths return PATH_BLOCKED errors with no data leakage
  • Protected: The .mcpignore file itself cannot be accessed via MCP

Example .mcpignore

# Personal content
journal/
diary/
private/

# Work files
work/confidential/
clients/*/contracts/

# Temporary files
*.tmp
*.backup
.#*

# Allow specific files
!work/public-docs/

☁️ Cloud Sync Friendly

The plugin gracefully handles sync delays and file locking from cloud storage services.

Supported Services

Works automatically with:

  • iCloud Drive - Handles .icloud sync artifacts and timing conflicts
  • OneDrive - Manages file locks and sync delays
  • Dropbox - Handles sync markers and temporary files
  • Google Drive - Manages sync state transitions
  • Any sync service - Universal retry logic works with all platforms

How It Works

The plugin automatically:

  1. Detects sync conflicts - Recognizes EEXIST, EBUSY, and "file already exists" errors
  2. Retries intelligently - Uses exponential backoff (500ms β†’ 1s β†’ 2s)
  3. Resolves timing issues - Allows sync services time to complete operations
  4. Works transparently - No configuration needed, just works

Benefits

  • No phantom files - Resolves "file already exists" errors for non-existent files
  • Reliable operations - File creation, updates, and deletes work consistently
  • Zero configuration - Automatic detection and handling
  • Cross-platform - Same behavior on macOS, Windows, and Linux

Installation

Note: This plugin is currently pending review for the Obsidian Community Plugins directory. Until approved, please use the BRAT installation method below.

Current Installation: Via BRAT (Beta Reviewer's Auto-update Tool)

Since this plugin is not yet in the Community Plugins directory, you'll need to use BRAT to install it:

  1. Install BRAT:

    • Open Obsidian Settings β†’ Community Plugins
    • Browse and search for "BRAT"
    • Install and enable the BRAT plugin
  2. Add This Plugin:

    • In Obsidian settings, go to BRAT settings
    • Click "Add Beta Plugin"
    • Enter: https://github.com/aaronsb/obsidian-mcp-plugin
    • Click "Add Plugin"
  3. Enable the Plugin:

    • Go to Settings β†’ Community Plugins
    • Find "Obsidian MCP Plugin" and enable it
    • The plugin will auto-update through BRAT

Future Installation: Via Community Plugins (After Approval)

Once this plugin is approved and available in the Obsidian Community Plugins directory:

  1. Open Obsidian Settings β†’ Community Plugins
  2. Click "Browse" and search for "MCP"
  3. Find "Obsidian MCP Plugin" by Aaron Bockelie
  4. Click "Install" then "Enable"

For BRAT Users: After the plugin is approved, you can remove it from BRAT and install it normally through Community Plugins to receive standard updates.

Configuration

  1. Enable the Server:

    • Go to plugin settings
    • Toggle "Enable HTTP Server"
    • Default port is 3001 (configurable)
  2. Connect Your MCP Client:

    Claude Code

    claude mcp add obsidian http://localhost:3001/mcp --transport http
    

    Claude Desktop / Other Clients

    Option 1: Direct HTTP Transport (if your client supports it)

    For HTTP (default):

    {
      "mcpServers": {
        "obsidian": {
          "transport": {
            "type": "http",
            "url": "http://localhost:3001/mcp"
          }
        }
      }
    }
    

    For HTTPS (requires proper certificate trust):

    {
      "mcpServers": {
        "obsidian": {
          "transport": {
            "type": "http",
            "url": "https://localhost:3443/mcp"
          }
        }
      }
    }
    

    Note: Direct HTTPS transport may not work with self-signed certificates. Use Option 2 with mcp-remote for HTTPS.

    Option 2: Via mcp-remote (recommended for Claude Desktop)

    Since Claude Desktop might not support streaming HTTP transport yet, use mcp-remote:

    {
      "mcpServers": {
        "obsidian-vault-name": {
          "command": "npx",
          "args": [
            "mcp-remote",
            "http://localhost:3001/mcp"
          ]
        }
      }
    }
    

    Configuration file locations:

    • macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
    • Windows: %APPDATA%\Claude\claude_desktop_config.json
    • Linux: ~/.config/Claude/claude_desktop_config.json

    Windows Note: If you encounter command line parsing errors with the Authorization header, use this format instead:

    {
      "mcpServers": {
        "obsidian-vault-name": {
          "command": "npx",
          "args": [
            "mcp-remote",
            "http://localhost:3001/mcp",
            "--header",
            "Authorization:${AUTH}"
          ],
          "env": {
            "AUTH": "Bearer YOUR_API_KEY_HERE"
          }
        }
      }
    }
    

    This avoids Windows command line issues with spaces in arguments.

HTTPS/TLS Configuration (v0.9.0+)

The plugin supports secure HTTPS connections with both self-signed and CA-signed certificates, making it ideal for various deployment scenarios including Docker containers and headless servers.

Certificate Options
  1. Self-Signed Certificates (Default):

    • Auto-generated on first launch
    • Stored in .obsidian/plugins/semantic-vault-mcp/certificates/
    • Valid for 1 year with localhost/127.0.0.1 SANs
    • Perfect for local development
  2. Custom CA-Signed Certificates:

    • Provide your own certificate and key files
    • Ideal for production environments, Docker containers, or headless servers
    • No client-side certificate trust workarounds needed
    • Supports standard PEM format certificates
Configuration Steps
  1. Enable HTTPS in Plugin Settings:

    • Go to plugin settings in Obsidian
    • Find "HTTPS/TLS Settings" section
    • Toggle "Enable HTTPS Server"
    • Default HTTPS port is 3443 (auto-increments if in use)

    For Custom Certificates:

    • Clear the auto-generated certificate paths
    • Enter paths to your certificate and key files
    • Supported formats: .pem, .crt, .key
  2. Configure Claude Code / MCP Client:

    For Self-Signed Certificates:

    {
      "mcpServers": {
        "obsidian-vault-name": {
          "command": "npx",
          "args": [
            "mcp-remote",
            "https://localhost:3443/mcp",
            "--header",
            "Authorization:${AUTH}"
          ],
          "env": {
            "NODE_TLS_REJECT_UNAUTHORIZED": "0",
            "AUTH": "Bearer YOUR_API_KEY_HERE"
          }
        }
      }
    }
    

    Note: The env section is required for self-signed certificates. The Authorization header uses ${AUTH} to avoid Windows command line issues.

    For CA-Signed Certificates:

    {
      "mcpServers": {
        "obsidian-vault-name": {
          "command": "npx",
          "args": [
            "mcp-remote",
            "https://your-domain.com:3443/mcp",
            "--header",
            "Authorization:${AUTH}"
          ],
          "env": {
            "AUTH": "Bearer YOUR_API_KEY_HERE"
          }
        }
      }
    }
    

    Note: No NODE_TLS_REJECT_UNAUTHORIZED needed - the certificate is trusted by default.

Docker & Headless Deployment

The HTTPS support is particularly useful for running Obsidian in headless environments:

  1. Docker Container Setup:

    # Mount your certificates into the container
    VOLUME ["/certs"]
    
    # Configure plugin to use mounted certificates
    # Set certificate paths in plugin settings:
    # - Certificate Path: /certs/server.crt
    # - Key Path: /certs/server.key
    
  2. Benefits for Headless Environments:

    • Secure remote access to your Obsidian vault
    • No GUI needed for certificate configuration
    • Proper TLS encryption for production deployments
    • Compatible with reverse proxies and load balancers
  3. Example Docker Compose:

    services:
      obsidian:
        image: your-obsidian-image
        ports:
          - "3443:3443"
        volumes:
          - ./certs:/certs:ro
          - ./vault:/vault
        environment:
          - OBSIDIAN_CERT_PATH=/certs/server.crt
          - OBSIDIAN_KEY_PATH=/certs/server.key
    
Certificate Management Tips
  1. Generate a Proper Certificate with Let's Encrypt:

    certbot certonly --standalone -d your-domain.com
    # Certificates will be in /etc/letsencrypt/live/your-domain.com/
    
  2. Create a Self-Signed Certificate Manually:

    openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem \
      -days 365 -nodes -subj "/CN=localhost"
    
  3. Certificate Requirements:

    • Must be in PEM format
    • Private key should not be password-protected
    • Include proper SANs for your domain/IP
  4. Security Considerations:

    • Use CA-signed certificates for production
    • Self-signed certificates are suitable for local development only
    • Keep private keys secure and never commit them to version control
    • Rotate certificates before expiration

Concurrent Sessions for Agent Swarms (v0.5.8+)

Enable multiple AI agents to work with your vault simultaneously without blocking each other:

  1. Enable in Settings:

    • Go to plugin settings
    • Find "Concurrent Sessions" section
    • Toggle "Enable Concurrent Sessions for Agent Swarms"
    • Adjust max connections if needed (default: 32)
  2. Architecture:

    • Each AI session gets its own isolated MCP server instance
    • True parallel processing - no blocking between sessions
    • Automatic session management with 1-hour timeout
    • Session reuse for reconnecting clients
  3. Monitor Active Sessions:

    • Use the obsidian://session-info resource to view:
      • Active sessions with "This is you!" indicator
      • Session age, idle time, and request counts
      • Server pool utilization statistics
  4. Use Cases:

    • Multiple Claude instances working on different parts of your vault
    • AI agent teams collaborating on research or writing projects
    • Parallel processing of large knowledge bases
    • Non-blocking operation for time-sensitive workflows

Available Tools

πŸ—‚οΈ vault - File and Folder Operations

  • list - List files and directories
  • read - Read file content with fragments for large files
  • create - Create new files and directories
  • update - Update existing files
  • delete - Delete files and folders
  • search - Enhanced search with Obsidian operators
  • fragments - Get relevant excerpts from files
  • move - Move files to new locations (preserves links)
  • rename - Rename files in place (preserves links)
  • copy - Create copies of files
  • split - Split files by headings, delimiter, lines, or size
  • combine - Merge multiple files with sorting options
  • concatenate - Simple two-file joining

πŸ” Search Operators:

  • file: - Search by filename or extension (e.g., file:.png)
  • path: - Search in file paths
  • content: - Search only in file content
  • tag: - Search for tags
  • "exact phrase" - Search for exact phrases
  • term1 OR term2 - Search for either term
  • /regex/flags - Regular expression search

✏️ edit - Smart Editing Operations

  • window - Edit with automatic content buffering
  • append - Append content to files
  • patch - Intelligent patching with fuzzy matching
  • at_line - Edit at specific line numbers
  • from_buffer - Recover content from edit buffers

πŸ‘οΈ view - Content Viewing and Navigation

  • file - View complete files with metadata
  • window - View content windows with context
  • active - Get currently active file
  • open_in_obsidian - Open files in Obsidian

πŸ”„ workflow - AI Workflow Guidance

  • suggest - Get contextual suggestions based on current operations

πŸ•ΈοΈ graph - Graph Traversal and Link Analysis

  • traverse - Explore connected nodes from a starting point
  • neighbors - Get immediate connections of a file
  • path - Find paths between two nodes
  • statistics - Get link counts and statistics for files
  • backlinks - Find all incoming links to a file
  • forwardlinks - Find all outgoing links from a file
  • search-traverse - Search-based graph traversal with snippet chains
  • advanced-traverse - Multi-query traversal with strategies (breadth-first, best-first, beam-search)

Graph Features:

  • links/backlinks/tags - Follow connections during traversal
  • pattern/folder/tag filters - Filter by file patterns, folders, or tags
  • depth/max_nodes - Control traversal depth and maximum nodes
  • relevance_scores - Get relevance scores and snippet chains
  • orphaned/unresolved - Support for orphaned notes and unresolved links

βš™οΈ system - System Operations

  • info - Get vault and plugin information
  • commands - List and execute Obsidian commands
  • fetch_web - Fetch and convert web content to markdown

Configuration

Plugin Settings

Access plugin settings via Obsidian Settings β†’ Community Plugins β†’ Obsidian MCP Plugin β†’ Settings

  • HTTP Port: Port for MCP server (default: 3001)
  • Enable Concurrent Sessions: Allow multiple AI agents to work simultaneously (default: enabled)
  • Max Concurrent Connections: Maximum number of parallel operations (default: 32)
  • Path Exclusions (.mcpignore): Enable/disable path blocking via .mcpignore file
  • Enable Context Menu: Add "Add to .mcpignore" to file/folder right-click menus
  • Debug Logging: Enable detailed console logging for troubleshooting

Concurrent Sessions (v0.5.8+)

The plugin supports multiple AI agents working simultaneously through session-based connection pooling:

  • Each MCP client gets a unique session ID
  • Sessions are isolated and tracked independently
  • CPU-intensive operations (search, graph traversal) can run in parallel
  • Worker threads prevent blocking the main Obsidian UI
  • Sessions automatically expire after 1 hour of inactivity

Performance with Concurrent Sessions:

  • Up to 32 simultaneous operations (configurable)
  • Worker threads for CPU-intensive tasks
  • Non-blocking UI during heavy operations
  • Automatic session cleanup and resource management

MCP Resources

  • obsidian://vault-info - Real-time vault metadata including file counts, active file, and plugin status
  • obsidian://session-info - Active sessions and connection pool statistics (when concurrent sessions enabled)

Key Improvements Over External MCP Servers

  1. Performance: Direct vault access eliminates HTTP overhead
  2. Search: Uses Obsidian's native search with advanced operators
  3. Integration: Access to full Obsidian API and plugin ecosystem
  4. Simplicity: Single plugin installation, no external dependencies
  5. Reliability: No separate processes to manage or crash

Architecture

This plugin implements the same semantic operations as obsidian-semantic-mcp but runs directly within Obsidian:

Before: AI Tool β†’ MCP Server β†’ REST API Plugin β†’ Obsidian
Now:    AI Tool β†’ MCP Plugin (within Obsidian)

The critical ObsidianAPI abstraction layer is preserved, allowing all semantic operations to work identically while gaining the performance benefits of direct integration.

Testing Status

βœ… Working Features:

  • All 6 semantic tools with all actions
  • Enhanced search with Obsidian operators
  • Graph traversal and link analysis
  • Image viewing and file operations
  • Fragment retrieval for large files
  • Workflow hints and guidance
  • Multi-vault support
  • Port collision detection
  • Cross-platform tested (Linux, Windows, macOS)

⚑ Performance Results:

  • File operations: <10ms (vs ~50-100ms with REST API)
  • Search operations: <50ms (vs ~100-300ms)
  • Zero network overhead

Development

# Clone to your vault's plugins folder
git clone https://github.com/aaronsb/obsidian-mcp-plugin .obsidian/plugins/obsidian-mcp-plugin

# Install dependencies
npm install

# Build for development
npm run dev

# Build for production
npm run build

Support

Sponsorship

If you find this plugin useful, please consider supporting its development:

GitHub Sponsors

Your support helps maintain and improve this plugin!

License

MIT


This plugin brings the power of semantic MCP directly into Obsidian, providing AI tools with intelligent, high-performance vault access.