Cassandra

v1.0.0

Design Cassandra tables, write efficient queries, and avoid distributed database pitfalls.

2· 828·4 current·4 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (Cassandra table design, queries, ops) match the declared requirements (optionally use cqlsh and nodetool). No unrelated binaries, env vars, or config paths are required.
Instruction Scope
SKILL.md content is focused on Cassandra modeling, query restrictions, consistency, tombstones, compaction, and nodetool usage. It does not instruct the agent to read unrelated files, exfiltrate data, or call external endpoints beyond typical operator commands (cqlsh/nodetool).
Install Mechanism
No install spec — instruction-only. Nothing will be downloaded or written to disk by the skill itself.
Credentials
No environment variables or credentials are requested. The declared optional binaries (cqlsh, nodetool) are appropriate for the stated functionality.
Persistence & Privilege
always is false and the skill does not request persistent system presence or modification of other skills. Default autonomous invocation is allowed (platform normal) but is not combined with extra privileges here.
Assessment
This is an instruction-only skill that provides Cassandra best-practices and references cqlsh/nodetool. It does not request credentials or install code, so its footprint is small and coherent. Things to consider before enabling: 1) If you allow the agent to run commands, cqlsh/nodetool can perform operational actions (e.g., repairs) against your cluster — ensure the agent's runtime environment and network access are limited to the intended test/production clusters. 2) Confirm those binaries on PATH are the versions you expect (to avoid surprising behavior). 3) The skill itself doesn't require credentials, but if you or the agent supply cluster credentials later, those grant real access; only provide them to trusted agents. Overall low risk, but operational commands can have real impact if executed against live clusters.

Like a lobster shell, security has layers — review code before you run it.

latestvk971b0acqz86zj74katm2t5gg980xz2t

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

👁️ Clawdis
OSLinux · macOS · Windows
Any bincqlsh, nodetool

Comments