Ollama Updater
PassAudited by ClawScan on May 10, 2026.
Overview
This appears to be a coherent Ollama installer/updater, but it should only be run intentionally because it uses sudo, replaces Ollama files, and enables a background service.
Install this only if you want a system-wide Ollama update and are comfortable granting sudo privileges. Review the full script locally before running it, especially because the provided artifact view is truncated, and prefer pinned or official sources when downloading installer scripts.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Running the installer can remove the existing Ollama installation directory and replace it with a newly downloaded version.
The updater deletes the existing Ollama library directory before installing the new version. This is scoped and consistent with an updater, but it is still a destructive system command.
status "Cleaning up old version at $OLLAMA_INSTALL_DIR/lib/ollama"
$SUDO rm -rf "$OLLAMA_INSTALL_DIR/lib/ollama"Run it only when you intend to update or reinstall Ollama, and back up any local modifications under the Ollama install directory first.
The installer can change system users/groups and may require administrator approval.
The script uses sudo to create an ollama system user and modify local group membership. This is expected for a system service installer, but it changes local account permissions.
$SUDO useradd -r -s /bin/false -U -m -d /usr/share/ollama ollama ... $SUDO usermod -a -G ollama $(whoami)
Review the script and run it with sudo only if you trust the skill and want system-wide Ollama installation.
If the remote repository or branch content changes unexpectedly, a user following the manual instructions could run different privileged code than the reviewed artifact.
The optional manual install path downloads a script from an unpinned GitHub main-branch URL and then runs it with sudo. This is disclosed and user-directed, but it relies on remote source integrity at install time.
curl -fsSL https://raw.githubusercontent.com/openclaw/skills/main/ollama-updater/ollama-install.sh -o ollama-install.sh ... sudo ./ollama-install.sh
Prefer the packaged/reviewed script or a pinned release/tag, and inspect the downloaded script before running it with sudo.
The user is trusting the remote Ollama download endpoint and the installer to place executable files on the system.
The installer downloads Ollama binaries from the provider and extracts them into a system install directory with elevated privileges. This is central to the installer purpose, but it is high-trust execution of remote software.
download_and_extract "https://ollama.com/download" "$OLLAMA_INSTALL_DIR" "ollama-linux-${ARCH}"
...
zstd -d -c "$TEMP_DIR/download.tar.zst" | $SUDO tar -xf - -C "${dest_dir}"Use trusted networks and official sources; verify checksums or signatures if Ollama provides them.
Ollama may continue running in the background and start on boot after installation.
The script installs a persistent systemd service that restarts automatically and is enabled on boot. This is normal for Ollama service setup, but it persists after the skill run completes.
cat <<EOF | $SUDO tee /etc/systemd/system/ollama.service >/dev/null ... Restart=always ... $SUDO systemctl enable ollama
If you do not want a persistent service, disable or stop it after installation with systemctl.
