GemmaMatch — Gemma 4 Local Hardware Matcher

v1.0.0

Auto-detect hardware and recommend the best Gemma 4 model for local deployment on PC, Mac, or mobile.

0· 51·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name and description (auto-detect hardware and recommend Gemma 4 variants) align with the SKILL.md content. The skill is instruction-only and uses browser WebGPU/WebGL detection and platform-specific run commands — these are coherent with the stated purpose.
Instruction Scope
SKILL.md instructs users to visit the website and allow in-browser hardware detection; it does not instruct the agent to read system files, env vars, or send data elsewhere. Note: detection happens in the user's browser (client-side) rather than the agent, so the skill relies on the website and user consent to run detection.
Install Mechanism
No install spec or code files are present (instruction-only), so nothing is written to disk or downloaded by the skill itself.
Credentials
The skill requests no environment variables, credentials, or config paths — this is proportionate to a read-only hardware-detection/recommendation guide.
Persistence & Privilege
The skill is not always-on and uses default model invocation settings; it does not request elevated or persistent system privileges.
Assessment
This skill appears coherent, but exercise normal caution before acting on any recommended terminal commands: 1) Confirm the website uses HTTPS and inspect the GitHub source (https://github.com/walex8925/Gemma4local) if you can. 2) Review any copy-paste run commands before executing — avoid piping unknown scripts into a shell (e.g., curl | sh). 3) Verify the site’s privacy claim by checking whether detection scripts make network calls (you can inspect the page or the repo). 4) If you want complete assurance, open the repository code locally or in a sandboxed browser to validate that hardware detection runs purely in-browser and no external data is exfiltrated.

Like a lobster shell, security has layers — review code before you run it.

latestvk97eq3rph8tv1qat3mqcc3ahj184se8g

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments