Skip to content

Security

This page covers security considerations when using obx.

obx has read and write access to your vault directory and all subdirectories. It cannot access files outside the vault path you specify.

Terminal window
# Server only accesses /path/to/vault and below
obx mcp /path/to/vault

The MCP server itself makes no network connections. All operations are local file system operations.

obx works directly with files. It does not:

  • Connect to Obsidian
  • Access Obsidian’s internal databases
  • Require Obsidian to be running
  • Interact with Obsidian plugins

When you use obx with an AI assistant, the AI can:

  • Read any note in your vault
  • Search across all content
  • View frontmatter and metadata
  • See file names and folder structure

With your permission (through prompts), the AI can:

  • Create new notes
  • Edit existing notes
  • Delete notes
  • Move and rename notes
  • Modify frontmatter
  • Add/remove tags

When you ask about your vault:

  1. Your question goes to the AI provider
  2. The AI decides which tools to use
  3. Tool results (note content) are sent to the AI
  4. The AI formulates a response

Note content flows through your AI provider’s servers according to their data handling policies.

Consider excluding sensitive notes:

  1. Separate vault: Keep sensitive notes in a different vault not connected to MCP
  2. Encryption: Use Obsidian’s encryption plugins for sensitive notes
  3. Selective queries: Be mindful of what you ask the AI to search

Always maintain backups:

Terminal window
# Simple backup before major operations
cp -r /path/to/vault /path/to/vault-backup-$(date +%Y%m%d)

Or use:

  • Git for version control
  • Obsidian Sync
  • Cloud backup services

For destructive operations:

“Show me what notes would be deleted before actually deleting them”

“List the notes that would be moved, then confirm before moving”

Use directory parameters to limit operations:

# Instead of searching entire vault
search-vault: query="password" directory="work"

The MCP protocol uses stdio (standard input/output) for communication. There are no:

  • Open network ports
  • HTTP endpoints
  • Remote connections

obx runs as a separate process:

  • Spawned by your MCP client
  • Communicates via stdin/stdout
  • Terminates when client disconnects

The server:

  • Does not store data between sessions
  • Does not cache vault content
  • Does not phone home

Run with minimal required permissions:

Terminal window
# The user running obx needs:
# - Read access to vault (for all operations)
# - Write access to vault (for modifications)

On shared systems:

  • Ensure vault directory permissions are restrictive
  • Consider separate user accounts for vault access
  • Review who has access to MCP client configuration

For enterprise deployments:

  • Review your AI provider’s enterprise data handling
  • Consider self-hosted AI options
  • Implement vault access policies
  • Audit tool usage through MCP client logs

If the AI makes unwanted changes:

  1. Stop immediately: Don’t continue the conversation
  2. Check git/backup: Restore from version control or backup
  3. Review changes: Use git diff or file system tools
  4. Understand what happened: Review the conversation

If concerned about data exposure:

  1. Review conversation history: What note content was shared?
  2. Check AI provider policies: Understand data retention
  3. Assess sensitivity: What was the potential impact?
  4. Take remediation steps: Rotate credentials, update sensitive info
  • Vault backups are configured and tested
  • Sensitive notes are in a separate vault or encrypted
  • AI provider’s data policy is understood
  • Directory permissions are appropriate
  • Not running as root/admin unnecessarily
  • Destructive operations are previewed before execution