Deepseek R1 Guide

v1.0.0

DeepSeek AI 开发助手,精通 DeepSeek API、模型选型、推理优化、本地部署

0· 134·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (DeepSeek developer guide) matches the SKILL.md content: API examples, model descriptions, pricing and local deployment instructions. Nothing in the file asks for unrelated capabilities or secrets.
Instruction Scope
Instructions remain within the stated scope: sample API calls, streaming, reasoning outputs, Ollama and vLLM deployment commands, and hardware guidance. The SKILL.md does not instruct the agent to read local files or exfiltrate data. It does show example code that expects an API key but does not try to obtain it automatically.
Install Mechanism
No install spec or code files are present (instruction-only), so nothing is written to disk by the skill itself. The doc references third-party tools (ollama, vllm) which the user would install separately; that is expected for local model deployment.
Credentials
The skill declares no required env vars or credentials. Example snippets reference an API key (sk-xxx) which is appropriate for an API integration guide; no unrelated credentials or excessive environment access are requested.
Persistence & Privilege
The skill is not always-enabled and allows normal model invocation behavior. It does not request persistent system-level privileges or modify other skills' configs (no install actions present).
Assessment
This appears to be a coherent developer guide rather than executable code. Before using: verify the DeepSeek service and domain (https://api.deepseek.com) are legitimate; never paste real API keys into untrusted examples or public prompts; when following the local-deploy steps (ollama/vLLM) confirm you trust the model images you pull and have adequate disk/GPU resources; be cautious about large downloads and verify pricing/performance claims independently. If you plan to use these commands in automation, ensure your automation never leaks real credentials or system secrets.

Like a lobster shell, security has layers — review code before you run it.

latestvk97b9dy3xa8pdjvs6whvn8hfxs83b4vj

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments