Security
This page covers security considerations when using obx.
Access Model
Section titled “Access Model”File System Access
Section titled “File System Access”obx has read and write access to your vault directory and all subdirectories. It cannot access files outside the vault path you specify.
# Server only accesses /path/to/vault and belowobx mcp /path/to/vaultNo Network Access
Section titled “No Network Access”The MCP server itself makes no network connections. All operations are local file system operations.
No Obsidian Access
Section titled “No Obsidian Access”obx works directly with files. It does not:
- Connect to Obsidian
- Access Obsidian’s internal databases
- Require Obsidian to be running
- Interact with Obsidian plugins
AI Assistant Considerations
Section titled “AI Assistant Considerations”What the AI Can Access
Section titled “What the AI Can Access”When you use obx with an AI assistant, the AI can:
- Read any note in your vault
- Search across all content
- View frontmatter and metadata
- See file names and folder structure
What the AI Can Modify
Section titled “What the AI Can Modify”With your permission (through prompts), the AI can:
- Create new notes
- Edit existing notes
- Delete notes
- Move and rename notes
- Modify frontmatter
- Add/remove tags
Data Sent to AI Provider
Section titled “Data Sent to AI Provider”When you ask about your vault:
- Your question goes to the AI provider
- The AI decides which tools to use
- Tool results (note content) are sent to the AI
- The AI formulates a response
Note content flows through your AI provider’s servers according to their data handling policies.
Best Practices
Section titled “Best Practices”Sensitive Information
Section titled “Sensitive Information”Consider excluding sensitive notes:
- Separate vault: Keep sensitive notes in a different vault not connected to MCP
- Encryption: Use Obsidian’s encryption plugins for sensitive notes
- Selective queries: Be mindful of what you ask the AI to search
Vault Backup
Section titled “Vault Backup”Always maintain backups:
# Simple backup before major operationscp -r /path/to/vault /path/to/vault-backup-$(date +%Y%m%d)Or use:
- Git for version control
- Obsidian Sync
- Cloud backup services
Review AI Actions
Section titled “Review AI Actions”For destructive operations:
“Show me what notes would be deleted before actually deleting them”
“List the notes that would be moved, then confirm before moving”
Limit Scope
Section titled “Limit Scope”Use directory parameters to limit operations:
# Instead of searching entire vaultsearch-vault: query="password" directory="work"MCP Protocol Security
Section titled “MCP Protocol Security”Local Communication
Section titled “Local Communication”The MCP protocol uses stdio (standard input/output) for communication. There are no:
- Open network ports
- HTTP endpoints
- Remote connections
Process Isolation
Section titled “Process Isolation”obx runs as a separate process:
- Spawned by your MCP client
- Communicates via stdin/stdout
- Terminates when client disconnects
No Persistent State
Section titled “No Persistent State”The server:
- Does not store data between sessions
- Does not cache vault content
- Does not phone home
Deployment Considerations
Section titled “Deployment Considerations”Permissions
Section titled “Permissions”Run with minimal required permissions:
# The user running obx needs:# - Read access to vault (for all operations)# - Write access to vault (for modifications)Shared Systems
Section titled “Shared Systems”On shared systems:
- Ensure vault directory permissions are restrictive
- Consider separate user accounts for vault access
- Review who has access to MCP client configuration
Enterprise Use
Section titled “Enterprise Use”For enterprise deployments:
- Review your AI provider’s enterprise data handling
- Consider self-hosted AI options
- Implement vault access policies
- Audit tool usage through MCP client logs
Incident Response
Section titled “Incident Response”Unintended Modifications
Section titled “Unintended Modifications”If the AI makes unwanted changes:
- Stop immediately: Don’t continue the conversation
- Check git/backup: Restore from version control or backup
- Review changes: Use
git diffor file system tools - Understand what happened: Review the conversation
Data Exposure Concerns
Section titled “Data Exposure Concerns”If concerned about data exposure:
- Review conversation history: What note content was shared?
- Check AI provider policies: Understand data retention
- Assess sensitivity: What was the potential impact?
- Take remediation steps: Rotate credentials, update sensitive info
Security Checklist
Section titled “Security Checklist”- Vault backups are configured and tested
- Sensitive notes are in a separate vault or encrypted
- AI provider’s data policy is understood
- Directory permissions are appropriate
- Not running as root/admin unnecessarily
- Destructive operations are previewed before execution