loading…
Search for a command to run...
loading…
A security-hardened MCP server that enables AI models to safely interact with Obsidian vaults through sandboxed file operations and todo tracking. It implements
A security-hardened MCP server that enables AI models to safely interact with Obsidian vaults through sandboxed file operations and todo tracking. It implements strict validation layers and resource limits to protect the local filesystem from potentially hostile tool calls.
A security-hardened Model Context Protocol server with two independent tool modules: Obsidian vault tools for managing a knowledge base, and git tools for LLM-assisted code review. Built for adversarial environments where the connected AI cannot be trusted.
--vault)| Tool | Description |
|---|---|
getAllFilenames |
List all vault files, sorted by most recently modified |
readMultipleFiles |
Read files by exact, case-insensitive, or partial name match |
getOpenTodos |
Find all unchecked todo items (- [ ]) across markdown files |
updateFileContent |
Create or update files (9-step write validation chain) |
searchVault |
Search vault files by content (plain text or regex) with context snippets |
appendToFile |
Append content to an existing file (no file creation) |
listFiles |
List vault files filtered by folder and/or extension |
--repo)| Tool | Description |
|---|---|
gitStatus |
Working tree status (staged, unstaged, untracked) |
gitLog |
Commit history with configurable depth |
gitDiff |
Diff output (working tree, staged, or against a ref) |
gitBlame |
Per-line blame for a file |
All git tools are read-only. No mutations (no commit, push, reset, checkout).
npm install
npm run build
# Both modules — vault for context, repo for code review
node dist/index.js --vault /path/to/vault --repo /path/to/repo
# Vault only
node dist/index.js --vault /path/to/vault
# Repo only
node dist/index.js --repo /path/to/repo
At least one of --vault or --repo is required. The vault and repo are independent directories — the vault is a knowledge base (Obsidian), the repo is a code repository (git).
Add to ~/Library/Application Support/Claude/claude_desktop_config.json:
{
"mcpServers": {
"basalt": {
"command": "node",
"args": [
"/absolute/path/to/basalt-mcp/dist/index.js",
"--vault", "/path/to/your/vault",
"--repo", "/path/to/your/repo"
]
}
}
}
Add to .cursor/mcp.json in your project:
{
"mcpServers": {
"basalt": {
"command": "node",
"args": [
"/absolute/path/to/basalt-mcp/dist/index.js",
"--vault", "/path/to/your/vault",
"--repo", "/path/to/your/repo"
]
}
}
}
The server communicates over stdio using the MCP JSON-RPC protocol.
The server treats every tool call as potentially hostile.
Vault tools — all filesystem access is sandboxed to the vault directory through multiple independent layers:
O_NOFOLLOW write.md and .canvas (native Obsidian formats)O_NOFOLLOWGit tools — all git execution is sandboxed to the repo directory:
execFileSync only — no shell, no command injection possible$(), pipes, semicolonsSee SECURITY.md for the full threat model, design rationale, and all 118 tested attack vectors.
npm test # run all 341 tests
npm run test:watch # watch mode
npm run lint # type-check without emitting
npm run dev # watch mode compilation
src/
├── index.ts Server entrypoint (--vault/--repo flags, stdio transport)
├── core/ Shared security framework
│ ├── validation.ts Assertion functions (7)
│ ├── vault.ts Immutable vault path management
│ ├── repo.ts Immutable repo path management + git validation
│ ├── contentBoundary.ts Boundary markers for untrusted content (spotlighting)
│ └── errors.ts Error sanitization
└── tools/
├── obsidian/ Obsidian vault tool module
│ ├── getAllFilenames.ts
│ ├── readMultipleFiles.ts
│ ├── getOpenTodos.ts
│ ├── updateFileContent.ts
│ ├── searchVault.ts
│ ├── appendToFile.ts
│ └── listFiles.ts
└── git/ Git tool module
├── exec.ts Safe git execution helper
├── gitStatus.ts
├── gitLog.ts
├── gitDiff.ts
└── gitBlame.ts
The architecture separates the security core from tool implementations. The core handles validation, sandboxing, and error sanitization. Tool modules plug into the core and inherit all protections. The two modules are independent — you can run either or both.
MIT
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"basalt-mcp": {
"command": "npx",
"args": []
}
}
}Read and write pages in your workspace
Issues, cycles, triage — from Claude
Search and read your Drive files
Connect and unify data across various platforms and databases with [MindsDB as a single MCP server](https://docs.mindsdb.com/mcp/overview).