AI for Obsidian that works like the vault owner, not like a generic note bot.
Vaultsmith is a local agent launcher and review-first workflow for Obsidian vaults. It sets up vault-local instructions, starts codex or claude inside tmux, and gives the agent a constrained operating surface so note creation and organization can stay consistent with how the vault already works.
Most AI note tooling can generate text.
What it usually does badly:
- titles notes in a way that does not match the vault
- picks the wrong folder
- ignores linking habits and structure conventions
- rewrites too much when a small edit would do
- makes users manually clean up the result afterward
Vaultsmith exists to push the agent in the opposite direction:
- inspect the vault before making style claims
- prefer minimal edits over broad rewrites
- keep proposals short and reviewable
- treat vault conventions as a first-class constraint
- make approval explicit before applying edits
Vaultsmith currently ships a practical local workflow:
- initializes a vault-local
.vaultsmith/workspace - writes role prompts and bootstrap instructions for Codex and Claude
- launches agent sessions in
tmux - defaults to a review-first flow with proposal and receipt files
- lets you inspect status, tail output, approve, and apply
- keeps a small vault memory file for durable conventions
It is intentionally narrow right now. The current product is a launcher and guardrail layer for agent-driven vault work, not a full autonomous vault intelligence system yet.
Vaultsmith should help an agent behave more like the person who owns the vault.
That means the agent should learn and respect signals such as:
- naming patterns
- folder placement habits
- heading structure
- bullet and checklist style
- link and tag behavior
- frontmatter usage
- note family conventions
The long-term direction is simple: when Vaultsmith creates or reorganizes a note, it should feel native to the vault immediately.
Requirements:
- Python 3.11+
pipxtmux- at least one supported agent CLI on
PATH:codexorclaude - optional but recommended: the
obsidianCLI for vault-aware create/read/search/move/rename actions
Vaultsmith launches agent sessions inside tmux, so tmux must be installed before vsm chat or vsm run can work.
# macOS
brew install tmux
# Ubuntu / Debian
sudo apt-get install tmuxThe default install path is:
pipx install vaultsmith
vsm setup ~/Obsidian/MyVault
cd ~/Obsidian/MyVault
vsm run -- "Organize my inbox notes"Vaultsmith is a CLI tool, not a library. pipx is the cleanest default because it installs the command into an isolated environment without making users create a project virtualenv just to try the tool.
If you prefer pip, install Vaultsmith into a virtual environment:
python -m venv .venv
source .venv/bin/activate
python -m pip install vaultsmithIf Vaultsmith chooses to use the obsidian CLI for vault-aware actions, remember that Obsidian CLI can operate on the currently active Obsidian vault instead of the shell's current working directory. In practice, that means Vaultsmith should be run from the intended vault root, and Obsidian should have that same vault active when CLI-backed actions matter.
If you are working on Vaultsmith itself:
git clone https://github.com/ronut01/Vaultsmith.git
cd Vaultsmith
python -m venv .venv
source .venv/bin/activate
python -m pip install -e . pytestInteractive session:
vsm chatOne-shot request:
vsm run -- "Clean up my unfinished notes"Vaultsmith is designed so the agent proposes work before it applies work.
Typical flow:
vsm run -- "Organize my lecture video links"
vsm review
vsm approve
vsm applyUseful follow-up commands:
vsm status
vsm tail
vsm sessions
vsm resume <session-id>Behavior notes:
vsm runattaches by default so you can respond to trust prompts and other interactive agent questionsvsm run --detach -- "..."keeps the run in the background and prints recent tmux outputvsm applydoes not patch files itself; it re-dispatches the approved session to the underlying agent and then expects areceipt.md
Running vsm setup <vault> creates a small control plane inside the target vault:
.vaultsmith/
config.toml
instructions/
codex.md
claude.md
memory/
vault-summary.md
roles/
input-agent.md
vault-analyst.md
research-scout.md
draft-agent.md
consistency-reviewer.md
sessions/
<session-id>/
session.json
proposal.md
approval.md
receipt.md
changes.json
Session files matter:
session.json: metadata, mode, runtime state, approval stateproposal.md: short proposed plan and draft output before edits are appliedapproval.md: approval checkpointreceipt.md: short execution summary after applychanges.json: proposed operations payload when the session provides one
vsm setup <path> # initialize Vaultsmith in a vault
vsm chat [path] # start an interactive agent session
vsm run [path] -- "..." # start a one-shot request
vsm status [session-id] # inspect current or selected session
vsm tail [session-id] # show recent tmux output
vsm review [session-id] # print proposal.md
vsm approve [session-id] # mark session approved
vsm apply [session-id] # dispatch approved work
vsm sessions # list recent sessions
vsm resume <session-id> # re-attach to tmux session
vsm alias enable vs # install a shorthand shell aliasVaultsmith is opinionated in a few ways.
The vault is the source of truth. The agent should look at local evidence before inventing a structure or style.
For most requests, a few relevant notes are better than a noisy global survey.
Users should be able to inspect, reject, or refine proposed changes before the agent edits the vault.
Most vault work is maintenance, not greenfield writing. The safe default is a narrow change.
Vaultsmith currently includes:
- local CLI
- tmux-backed agent launch
- vault bootstrap files
- review-first session workflow
- basic session state and approval handling
Run tests:
cd Vaultsmith
source .venv/bin/activate # or the virtualenv you use for local development
pytest -qSmoke test against a temporary vault:
mkdir -p /tmp/vsm-smoke-vault
vsm setup /tmp/vsm-smoke-vault
cd /tmp/vsm-smoke-vault
vsm run -- "Create a test note and explain the current vault state"If you want to contribute, start here:
Vaultsmith is early, but the direction is deliberate.
The goal is not to bolt AI onto Obsidian. The goal is to make an agent operate inside a vault with enough structure, memory, and review pressure that the output starts to feel like it belongs there.