Secure MCP server for Obsidian with OWASP Top 10 controls and full audit logging.
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"io-github-dewtech-technologies-obsidian-mcp-secure": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Secure MCP server for Obsidian with OWASP Top 10 controls and full audit logging.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationBe the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in productivity / legal
XcodeBuildMCP provides tools for Xcode project management, simulator management, and app utilities.
mini cli search engine for your docs, knowledge bases, meeting notes, whatever. Tracking current sota approaches while being all local
a self-hosted project management & Kanban solution + Instant shareable boards
A Model Context Protocol (MCP) server that provides secure integration with Google Drive, Docs, Sheets, Slides and Calendar. It allows Claude Desktop and other MCP clients to manage files in Google Drive through a standardized interface.
MCP Security Weekly
Get CVE alerts and security updates for io.github.dewtech-technologies/obsidian-mcp-secure and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Secure Model Context Protocol server that turns your Obsidian vault into a reliable data source for any MCP-compatible AI client — built from scratch with OWASP Top 10 controls and full audit logging.
Listed on the official Anthropic MCP Registry as io.github.dewtech-technologies/obsidian-mcp-secure.
It's the opposite: it's a bridge that lets Claude Desktop (or any MCP client) read and write inside Obsidian safely. Your AI assistant stays where it lives; your vault becomes a structured, auditable datasource it can reach.
┌─────────────────┐ MCP ┌──────────────────────┐ HTTP ┌────────────────────┐ FS ┌─────────────┐
│ │ stdio │ │ :27123 │ │ │ │
│ Claude Desktop │ ───────▶ │ obsidian-mcp-secure │ ───────▶ │ Local REST API │ ─────▶ │ Vault .md │
│ (AI client) │ │ (this package) │ │ (Obsidian plugin) │ │ │
└─────────────────┘ └──────────────────────┘ └────────────────────┘ └─────────────┘
| Role in the pipeline | Component |
|---|---|
| Where you talk | Claude Desktop (or any MCP client) |
| Bridge / access control | obsidian-mcp-secure (this package) |
| Data gateway inside Obsidian | Local REST API plugin (by Adam Coddington) |
| Your knowledge | .md files in your vault |
One-liner: Claude is the brain, this MCP is the arm, Obsidian is the memory.
There are plugins that put Claude inside Obsidian. This is the inverse, and it exists because:
npx obsidian-mcp-secure and done. Works on Windows, macOS, Linux the same way.| Tool | Purpose |
|---|---|
read_note | Read a note by path |
list_notes | List files/folders in the vault or a subdirectory |
create_note | Create a new .md note |
edit_note | Overwrite an existing note (previous content goes to the audit log) |
delete_note | Delete a note — requires confirm: true (Zod rejects otherwise) |
search_notes | Full-text / tag search using Obsidian's own search engine |
| Control | Implementation |
|---|---|
| A01 — Broken Access Control | Path traversal blocked (../, ..\\, encoded variants); .md extension enforced |
| A02 — Cryptographic Failures | API key read from .env or process env; never hardcoded, never logged |
| A03 — Injection | All inputs validated with Zod schemas; no eval, no exec, no shell |
| A04 — Insecure Design | 512 KB max note size; 50-result cap on search; destructive ops require explicit confirm: true |
| A05 — Security Misconfigura |