jimprosser

Secure remote MCP server for Obsidian vaults -- access your notes from Claude, your phone, or any MCP client, anywhere. OAuth 2.0 auth, Cloudflare Tunnel, atomic writes safe for Obsidian Sync.

19
1
100% credibility
Found Mar 18, 2026 at 19 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

This repository provides a secure remote server enabling AI assistants to read, search, write, and manage Obsidian markdown note vaults over the internet with authentication.

How It Works

1
🗂️ Discover the helper

You hear about a handy tool that lets your AI assistant safely reach your personal notes from anywhere, like your phone or web browser.

2
💻 Point to your notes

On the computer holding your notes folder, download the helper and tell it exactly where your notes live.

3
🔐 Set a private password

Create a strong, secret password so only you and your trusted AI can access your notes.

4
🚀 Start the helper

With one easy go, launch the helper – it quietly watches and protects your notes right there on your machine.

5
🌐 Open it to the world securely

Set up a safe tunnel so your notes helper is reachable from anywhere without exposing your computer.

6
🤖 Link your AI assistant

Tell your AI buddy, like Claude, the web address and password – it connects smoothly in moments.

AI manages notes everywhere

Now, from your desktop, phone, or anywhere, your AI can read, search, edit, and organize your notes just like magic.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 19 to 19 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is obsidian-web-mcp?

obsidian-web-mcp is a Python MCP server that exposes your Obsidian vault for secure remote access from Claude on web, desktop, or mobile. Set VAULT_PATH and tokens via env vars, run `uv run vault-mcp`, and connect clients to `https://your-tunnel.com/mcp/` for tools like vault_read, vault_search, vault_write, and vault_list. It handles atomic writes to play nice with Obsidian Sync, full-text search via ripgrep fallback, and frontmatter queries, all behind OAuth 2.0 and Cloudflare Tunnel—no open ports needed.

Why is it gaining traction?

Local MCP servers fail on remote Claude clients and risk Sync corruption; this delivers secure remote access solution with outbound-only tunnels, path-traversal blocks, and soft deletes to .trash. OAuth 2.0 mirrors Claude's Gmail flow for seamless setup, plus safety caps on writes and batches prevent abuse. Developers dig the zero-config tunnel script and launchd plists for always-on macOS deploys.

Who should use this?

Obsidian power users querying notes via Claude on iPhone during commutes, or researchers needing vault_search_frontmatter from web Claude without VPN hassle. Ideal for solo devs treating vaults as secure remote services for AI agents, especially if you're already on Cloudflare domains.

Verdict

Early alpha with 19 stars and 1.0% credibility score—docs shine with quickstarts and tests cover core ops, but expect tweaks for production. Grab it if secure remote access to vaults hooks you; skip for battle-tested alternatives until stars climb.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.