arcology
Verified Safeby zvxr
Overview
Self-hosting an MCP (Multi-Modal Communication Protocol) server to expose local Obsidian notes and functionalities to AI tools.
Installation
make runEnvironment Variables
- OBSIDIAN_REST_API_URL
- OBSIDIAN_API_KEY
- ARCOLOGY_MCP_KEY
- NGROK_AUTHTOKEN
Security Notes
The project uses environment variables for all sensitive information (Obsidian API key, Arcology MCP key, ngrok authtoken), mitigating hardcoded secrets. It implements bearer token authentication for the MCP Bridge, which is critical for securing the exposed API. ngrok is used to tunnel local services, inherently exposing them to the internet, but this is explicitly part of the design for AI agent access. The exposed Obsidian tools (read, write, delete, search, list files, patch content, periodic notes) provide significant control over the user's Obsidian vault; compromise of the ARCOLOGY_MCP_KEY would grant powerful access. Input validation appears reasonable through Pydantic models and JSON Schema definitions for tools, reducing direct injection risks.
Similar Servers
mcp-obsidian
Connects AI assistants to Obsidian vaults for secure and intelligent interaction, enabling AI-powered knowledge management.
obsidian-mcp-plugin
Connects Obsidian vault to AI assistants via Model Context Protocol (MCP), enabling AI to understand and navigate notes as a knowledge graph for semantic search and information synthesis.
mcp-obsidian
Facilitates LLM interaction with Obsidian vaults via the Local REST API plugin, enabling read/write operations and command execution.
SageMCP
A scalable platform for hosting MCP servers with multi-tenant support, OAuth integration, and connector plugins for various services, deployed on Kubernetes.