Nm Archetypes Architecture Paradigm Serverless
v1.8.3Apply serverless FaaS patterns for event-driven workloads with minimal infrastructure
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
The name/description promise serverless FaaS patterns and the SKILL.md contains architects' guidance, adoption steps, risks, and deliverables. The skill declares no binaries, env vars, or config paths — which is appropriate for a documentation-style skill.
Instruction Scope
The instructions are high-level design and operational guidance (identify functions, externalize state, instrument, use IaC). They do not instruct the agent to read files, exfiltrate env vars, call external endpoints, or run arbitrary shell commands. The only external reference is an optional suggestion to install the 'Claude Code' plugin for a fuller experience.
Install Mechanism
No install spec or code is present (instruction-only), so nothing is written to disk or fetched during installation.
Credentials
No credentials, env vars, or config paths are requested. This is proportionate for a documentation/architectural guidance skill.
Persistence & Privilege
always is false and model invocation is enabled (default). The skill does not request persistent presence or system-level changes.
Assessment
This skill is documentation-only and appears low-risk: it doesn't request credentials or install code. If you plan to have an agent act on these recommendations (deploy IaC, configure cloud providers), be cautious — that will require separate plugins/tools and cloud credentials (IAM keys, service accounts). Before granting those, verify any plugin's install source and the exact env vars/permissions it requests. If you only need architecture guidance, this skill is safe to use as-is.Like a lobster shell, security has layers — review code before you run it.
Runtime requirements
🏗️ Clawdis
latest
Night Market Skill — ported from claude-night-market/archetypes. For the full experience with agents, hooks, and commands, install the Claude Code plugin.
The Serverless Architecture Paradigm
When To Use
- Event-driven workloads with variable traffic
- Minimizing operational overhead for cloud-native apps
When NOT To Use
- Long-running processes exceeding function timeout limits
- Applications requiring persistent connections or local state
When to Employ This Paradigm
- When workloads are event-driven and exhibit intermittent or "bursty" traffic patterns.
- When the goal is to minimize infrastructure management and adopt a pay-per-execution cost model.
- When latency constraints from "cold starts" are acceptable for the use case or can be effectively mitigated.
Adoption Steps
- Identify Functions: Decompose workloads into small, stateless function handlers triggered by events such as HTTP requests, message queues, or scheduled timers.
- Externalize State: use managed services like databases and queues for all persistent state. Design handlers to be idempotent to validate that repeated executions do not have unintended side effects.
- Plan Cold-Start Mitigation: For latency-sensitive paths, keep function dependencies minimal. Employ strategies such as provisioned concurrency or "warmer" functions to reduce cold-start times.
- Implement Instrumentation and Security: Enable detailed tracing and logging for all functions. Adhere to the principle of least privilege with IAM roles and set per-function budgets to control costs.
- Automate Deployment: Use Infrastructure-as-Code (IaC) frameworks like SAM, CDK, or Terraform to create repeatable and reliable release processes.
Key Deliverables
- An Architecture Decision Record (ADR) that describes function triggers, runtime choices, state management strategies, and cost projections.
- A complete Infrastructure-as-Code (IaC) and CI/CD pipeline for automatically packaging and deploying functions.
- Observability dashboards to monitor key metrics including function duration, error rates, cold-start frequency, and cost.
Risks & Mitigations
- Vendor Lock-in:
- Mitigation: Where feasible, abstract away provider-specific APIs behind your own interfaces or adopt portable frameworks (e.g., Serverless Framework) to reduce dependency on a single cloud vendor.
- Debugging Challenges:
- Mitigation: Tracing execution across distributed functions can be complex. Standardize on specific instrumentation libraries and structured logging to simplify debugging.
- Resource Limits:
- Mitigation: Actively monitor provider-imposed limits, such as concurrency and memory quotas. Design workloads to be shardable or horizontally scalable to stay within these constraints.
Troubleshooting
Common Issues
Command not found Ensure all dependencies are installed and in PATH
Permission errors Check file permissions and run with appropriate privileges
Unexpected behavior
Enable verbose logging with --verbose flag
Comments
Loading comments...
