personal-ai-employee-hackathon
Verified Safeby engasix
Overview
Real-time terminal dashboard for monitoring FTE Shop AI Employee operations via Obsidian vault file watching.
Installation
python -m src.monitorEnvironment Variables
- VAULT_PATH
Security Notes
The project emphasizes local-first operation and includes robust path validation (`_is_path_in_vault`) to prevent directory traversal attacks, ensuring all file operations remain within the configured vault directory. Content displayed in the terminal is sanitized by Textual's built-in ANSI escaping. The `orchestrator.py` component invokes an external `claude` binary with `--dangerously-skip-permissions`, which shifts trust to the security and hardening of the `claude` binary itself; potential vulnerabilities in this external dependency could pose a risk, but the orchestrator's prompt construction for `claude` appears to avoid direct command injection from arbitrary user input. No obvious hardcoded sensitive secrets or unhandled network risks (beyond legitimate Gmail API interaction) were identified within the provided source.
Similar Servers
mcp-obsidian
Provides a secure, universal AI bridge for Obsidian vaults, enabling MCP-compatible AI assistants to read, write, and manage notes.
obsidian-mcp-server
Provides an OpenAI-compatible local Model Context Protocol (MCP) server within Obsidian, enabling external AI assistants and tools to semantically search the vault and perform file system operations.
mcp-obsidian-via-rest
An MCP server that enables AI assistants to read, search, and interact with Obsidian notes via its Local REST API, supporting multiple network transports and self-healing connections.
obsidian-mcp-server
Enables AI assistants to interact with and manage an Obsidian markdown vault via the Model Context Protocol (MCP).