Project Overview: kimaki
I standardized kimaki around one operational decision: todo state lives in Obsidian, not in repository markdown, and I treat the vault as the system of record for agent task flow and memory.
What We Built
- A repo policy layer (
AGENTS.md+MEMORY.md) that enforces Obsidian-first task management and explicitly avoids in-repo markdown todo tracking. - A concrete command workflow for daily execution: read open tasks, append new tasks, complete tasks by line, and report remaining open count.
- A memory-first operating pattern tied to a canonical vault path (
/Users/kristian/Documents/obsidian/agent) with project-scoped fallback rules. - Iterated operational reliability around vault access, reflected in repeated session work on external-directory permission retries and vault memory integration.
Why We Built It
- We needed one durable source of truth for active work; splitting tasks between repo files and notes had high drift risk.
- Obsidian is better aligned with ongoing recall and cross-session continuity, especially because this project expects QMD indexing and scripted prefetch before substantial work.
- The recent session pattern (multiple retries around permissions and vault integration) shows this was not theoretical cleanup; it was required to make the workflow dependable in practice.
- Keeping todo state outside the repo also protects the codebase from operational noise and keeps versioned content focused on product artifacts.
How It Works
- Before substantial work, I run the QMD prefetch script from the shared vault script path to load relevant memory context.
- For task operations, I use Obsidian CLI commands only: inspect today’s open todos, append new checklist items, and complete tasks in place.
- Default task scope is today’s daily note, unless the request targets a different note or vault.
- If Obsidian CLI emits helper-app warnings, I treat stderr carefully; prior runs documented that stdout can still contain valid results.
- There is no commit-based implementation trail yet in this snapshot, so operational intent is captured primarily through policy docs and session themes.