surrealism
v1.2.1SurrealDB Surrealism WASM extension development. Write Rust functions, compile to WASM, deploy as database modules. Part of the surreal-skills collection.
⭐ 2· 576·0 current·0 all-time
byBasit Mustafa@24601
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the SKILL.md content: it documents writing Rust functions, compiling to WASM, and registering modules in SurrealDB. The prerequisites mentioned (Rust toolchain, WASM target, SurrealDB CLI) are appropriate and expected for this functionality.
Instruction Scope
Instructions are narrowly scoped to project files, building a WASM binary, and running SurrealDB CLI commands to register modules. The example shows using database credentials on the CLI (e.g., --user root --pass root) — this is relevant to registering modules but users should avoid using high-privilege credentials in production and be cautious about running or registering untrusted WASM modules.
Install Mechanism
No install spec or downloadable artifacts are present; the skill is instruction-only and does not cause any code to be fetched or written by the registry installer. This is the lowest-risk install footprint.
Credentials
The skill declares no required environment variables or secrets, and the only credentials referenced appear in a CLI example to access SurrealDB. Requesting DB credentials (for registering modules) is proportionate to the task; however the skill itself does not require or store them.
Persistence & Privilege
always is false and the skill is user-invocable; it does not request persistent agent privileges or modify other skill configurations. Autonomous invocation is allowed by platform defaults but is not a special privilege granted by this skill.
Assessment
This skill is an instructional guide for building SurrealDB WASM extensions and appears internally consistent. Before using it: (1) only compile and deploy WASM modules from code you trust — WASM can execute arbitrary logic in your DB process; (2) avoid using high-privilege (root) DB credentials shown in examples; use least privilege and separate test environments; (3) install Rust and the SurrealDB CLI from official sources; (4) when registering modules, prefer storing WASM blobs in controlled buckets and review module code before enabling it in production. If you need higher assurance, verify the referenced upstream repository and rules document links and test the workflow in an isolated environment first.Like a lobster shell, security has layers — review code before you run it.
latestvk9745p0ycf0fhkkfcy6whhknr582vbcnsurrealdbvk9745p0ycf0fhkkfcy6whhknr582vbcn
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
