Apple Silicon Ai

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill is aligned with local Apple Silicon AI clustering, but it asks you to install an unreviewed package and run auto-discovering LAN AI agents without documented authentication boundaries.

Install only if you trust the ollama-herd package and are comfortable running a local-network AI router. Before processing sensitive prompts, recordings, or documents, verify that the service is firewalled or otherwise restricted to trusted Macs.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Installing the package gives that external software the ability to run on the Mac and provide the router/node commands.

Why it was flagged

The functional software is pulled from an external, unpinned Python package rather than code included in the reviewed artifact. This is central to the skill's purpose, but the package provenance and behavior are outside this review.

Skill content
pip install ollama-herd    # Apple Silicon optimized inference router
Recommendation

Verify the PyPI/GitHub package, maintainer, and version before installing; prefer a pinned version and review the package documentation/security model.

What this means

If the service is exposed on a shared network, unintended users or devices may be able to reach the AI endpoint, interact with the fleet, or send sensitive content through it.

Why it was flagged

The skill describes node auto-discovery and API use without a real API key. It does not document authentication, allowlisting, or encryption for LAN router/node communication while handling prompts, audio uploads, and embedding inputs.

Skill content
herd-node    # Apple Silicon node auto-discovers the router ... No IP addresses to configure, no config files. ... OpenAI(base_url="http://localhost:11435/v1", api_key="unused")
Recommendation

Before use, confirm how ollama-herd binds network interfaces and authenticates clients/nodes. Firewall port 11435, restrict it to trusted machines or a private network, and avoid sensitive files on untrusted LANs.

What this means

A running router or node can keep using local compute resources and writing local fleet state/logs.

Why it was flagged

The artifacts describe user-started router/node processes and local state/log files. This is expected for a fleet manager, but users should understand these services may continue accepting work until stopped.

Skill content
herd    # starts Apple Silicon router on port 11435 ... herd-node    # Apple Silicon node auto-discovers the router ... configPaths":["~/.fleet-manager/latency.db","~/.fleet-manager/logs/herd.jsonl"]
Recommendation

Run the services only when needed, know how to stop them, and review the local ~/.fleet-manager files if log retention matters.