markdown-vault-mcp
Markdown Vault MCP
Markdown vault MCP server with FTS5 + semantic search and frontmatter indexing
Package Details
markdown-vault-mcp
Environment Variables
Absolute path to the markdown vault directory
trueDisable write tools
INFOLog level for FastMCP internals; app loggers default to INFO, -v overrides both to DEBUG
file:///data/state/eventsEvent store backend for HTTP session persistence (file:///path or memory://)
markdown-vault-mcpMCP server name shown to clients
Directory for index and embeddings state files
Path to the FTS5 SQLite index file
Path to the numpy embeddings file
Comma-separated frontmatter fields to index for search
Comma-separated frontmatter fields required on every document
Comma-separated glob patterns to exclude from indexing
Embedding provider to use
OpenAI API key (required when MARKDOWN_VAULT_MCP_EMBEDDING_PROVIDER=openai)
nomic-embed-textOllama embedding model name
falseForce CPU-only inference for Ollama
http://localhost:11434Ollama server base URL
Git authentication token for push/pull
Remote git repository URL for managed mode
x-access-tokenGit username for token auth
markdown-vault-mcpGit committer name
noreply@markdown-vault-mcpGit committer email
30Seconds to wait before pushing (batches writes)
trueEnable Git LFS support
600Seconds between periodic git pulls (0 to disable)
Comma-separated allowed attachment extensions, or * for all
10Maximum attachment size in MB (0 for unlimited)
_templatesFolder name for note templates within the vault
Path to user-defined MCP prompt templates
Bearer token for authentication
OIDC auth mode: 'remote' (JWKS validation) or 'oidc-proxy' (OAuth proxy). Auto-detected if not set.
Public base URL of this server (required for OIDC)
OIDC discovery endpoint URL
OIDC client ID
OIDC client secret
Signing key for OIDC session JWTs (critical on Linux/Docker)
Expected OIDC token audience
openidSpace-separated required OIDC scopes
falseVerify access token JWT instead of id_token
Override Claude app domain for MCP Apps iframe sandboxing
ghcr.io/pvliesdonk/markdown-vault-mcp:v1.27.1
Package Arguments
Named
Environment Variables
/data/vaultPath to the vault directory inside the container
trueDisable write tools
INFOLog level for FastMCP internals; app loggers default to INFO, -v overrides both to DEBUG
file:///data/state/eventsEvent store backend for HTTP session persistence (file:///path or memory://)
markdown-vault-mcpMCP server name shown to clients
/data/stateDirectory for index and embeddings state files
Path to the FTS5 SQLite index file
Path to the numpy embeddings file
Comma-separated frontmatter fields to index for search
Comma-separated frontmatter fields required on every document
Comma-separated glob patterns to exclude from indexing
Embedding provider to use
OpenAI API key (required when MARKDOWN_VAULT_MCP_EMBEDDING_PROVIDER=openai)
nomic-embed-textOllama embedding model name
falseForce CPU-only inference for Ollama
http://localhost:11434Ollama server base URL
Git authentication token for push/pull
Remote git repository URL for managed mode
x-access-tokenGit username for token auth
markdown-vault-mcpGit committer name
noreply@markdown-vault-mcpGit committer email
30Seconds to wait before pushing (batches writes)
trueEnable Git LFS support
600Seconds between periodic git pulls (0 to disable)
Comma-separated allowed attachment extensions, or * for all
10Maximum attachment size in MB (0 for unlimited)
_templatesFolder name for note templates within the vault
Path to user-defined MCP prompt templates
1000Run as this UID (Docker entrypoint)
1000Run as this GID (Docker entrypoint)
Bearer token for authentication
OIDC auth mode: 'remote' (JWKS validation) or 'oidc-proxy' (OAuth proxy). Auto-detected if not set.
Public base URL of this server (required for OIDC)
OIDC discovery endpoint URL
OIDC client ID
OIDC client secret
Signing key for OIDC session JWTs (critical on Linux/Docker)
Expected OIDC token audience
openidSpace-separated required OIDC scopes
falseVerify access token JWT instead of id_token
Override Claude app domain for MCP Apps iframe sandboxing