mirror of
https://github.com/ollama/ollama.git
synced 2026-05-07 00:22:43 -05:00
Closed
opened 2026-04-28 06:18:43 -05:00 by GiteaMirror
·
61 comments
No Branch/Tag Specified
main
hoyyeva/anthropic-local-image-path
dhiltgen/ci
dhiltgen/llama-runner
parth-remove-claude-desktop-launch
hoyyeva/anthropic-reference-images-path
parth-anthropic-reference-images-path
brucemacd/download-before-remove
hoyyeva/editor-config-repair
parth-mlx-decode-checkpoints
parth-launch-codex-app
hoyyeva/fix-codex-model-metadata-warning
hoyyeva/qwen
parth/hide-claude-desktop-till-release
hoyyeva/opencode-image-modality
parth-add-claude-code-autoinstall
release_v0.22.0
pdevine/manifest-list
codex/fix-codex-model-metadata-warning
pdevine/addressable-manifest
brucemacd/launch-fetch-reccomended
jmorganca/llama-compat
launch-copilot-cli
hoyyeva/opencode-thinking
release_v0.20.7
parth-auto-save-backup
parth-test
jmorganca/gemma4-audio-replacements
fix-manifest-digest-on-pull
hoyyeva/vscode-improve
brucemacd/install-server-wait
parth/update-claude-docs
brucemac/start-ap-install
pdevine/mlx-update
pdevine/qwen35_vision
drifkin/api-show-fallback
mintlify/image-generation-1773352582
hoyyeva/server-context-length-local-config
jmorganca/faster-reptition-penalties
jmorganca/convert-nemotron
parth-pi-thinking
pdevine/sampling-penalties
jmorganca/fix-create-quantization-memory
dongchen/resumable_transfer_fix
pdevine/sampling-cache-error
jessegross/mlx-usage
hoyyeva/openclaw-config
hoyyeva/app-html
pdevine/qwen3next
brucemacd/sign-sh-install
brucemacd/tui-update
brucemacd/usage-api
jmorganca/launch-empty
fix-app-dist-embed
mxyng/mlx-compile
mxyng/mlx-quant
mxyng/mlx-glm4.7
mxyng/mlx
brucemacd/simplify-model-picker
jmorganca/qwen3-concurrent
fix-glm-4.7-flash-mla-config
drifkin/qwen3-coder-opening-tag
brucemacd/usage-cli
fix-cuda12-fattn-shmem
ollama-imagegen-docs
parth/fix-multiline-inputs
brucemacd/config-docs
mxyng/model-files
mxyng/simple-execute
fix-imagegen-ollama-models
mxyng/async-upload
jmorganca/lazy-no-dtype-changes
imagegen-auto-detect-create
parth/decrease-concurrent-download-hf
fix-mlx-quantize-init
jmorganca/x-cleanup
usage
imagegen-readme
jmorganca/glm-image
mlx-gpu-cd
jmorganca/imagegen-modelfile
parth/agent-skills
parth/agent-allowlist
parth/signed-in-offline
parth/agents
parth/fix-context-chopping
improve-cloud-flow
parth/add-models-websearch
parth/prompt-renderer-mcp
jmorganca/native-settings
jmorganca/download-stream-hash
jmorganca/client2-rebased
brucemacd/oai-chat-req-multipart
jessegross/multi_chunk_reserve
grace/additional-omit-empty
grace/mistral-3-large
mxyng/tokenizer2
mxyng/tokenizer
jessegross/flash
hoyyeva/windows-nacked-app
mxyng/cleanup-attention
grace/deepseek-parser
hoyyeva/remember-unsent-prompt
parth/add-lfs-pointer-error-conversion
parth/olmo2-test2
hoyyeva/ollama-launchagent-plist
nicole/olmo-model
parth/olmo-test
mxyng/remove-embedded
parth/render-template
jmorganca/intellect-3
parth/remove-prealloc-linter
jmorganca/cmd-eval
nicole/nomic-embed-text-fix
mxyng/lint-2
hoyyeva/add-gemini-3-pro-preview
hoyyeva/load-model-list
mxyng/expand-path
mxyng/environ-2
hoyyeva/deeplink-json-encoding
parth/improve-tool-calling-tests
hoyyeva/conversation
hoyyeva/assistant-edit-response
hoyyeva/thinking
origin/brucemacd/invalid-char-i-err
parth/improve-tool-calling
jmorganca/required-omitempty
grace/qwen3-vl-tests
mxyng/iter-client
parth/docs-readme
nicole/embed-test
pdevine/integration-benchstat
parth/remove-generate-cmd
parth/add-toolcall-id
mxyng/server-tests
jmorganca/glm-4.6
jmorganca/gin-h-compat
drifkin/stable-tool-args
pdevine/qwen3-more-thinking
parth/add-websearch-client
nicole/websearch_local
jmorganca/qwen3-coder-updates
grace/deepseek-v3-migration-tests
mxyng/fix-create
jmorganca/cloud-errors
pdevine/parser-tidy
revert-12233-parth/simplify-entrypoints-runner
parth/enable-so-gpt-oss
brucemacd/qwen3vl
jmorganca/readme-simplify
parth/gpt-oss-structured-outputs
revert-12039-jmorganca/tools-braces
mxyng/embeddings
mxyng/gguf
mxyng/benchmark
mxyng/types-null
parth/move-parsing
mxyng/gemma2
jmorganca/docs
mxyng/16-bit
mxyng/create-stdin
pdevine/authorizedkeys
mxyng/quant
parth/opt-in-error-context-window
brucemacd/cache-models
brucemacd/runner-completion
jmorganca/llama-update-6
brucemacd/benchmark-list
brucemacd/partial-read-caps
parth/deepseek-r1-tools
mxyng/omit-array
parth/tool-prefix-temp
brucemacd/runner-test
jmorganca/qwen25vl
brucemacd/model-forward-test-ext
parth/python-function-parsing
jmorganca/cuda-compression-none
drifkin/num-parallel
drifkin/chat-truncation-fix
jmorganca/sync
parth/python-tools-calling
drifkin/array-head-count
brucemacd/create-no-loop
parth/server-enable-content-stream-with-tools
qwen25omni
mxyng/v3
brucemacd/ropeconfig
jmorganca/silence-tokenizer
parth/sample-so-test
parth/sampling-structured-outputs
brucemacd/doc-go-engine
parth/constrained-sampling-json
jmorganca/mistral-wip
brucemacd/mistral-small-convert
parth/sample-unmarshal-json-for-params
brucemacd/jomorganca/mistral
pdevine/bfloat16
jmorganca/mistral
brucemacd/mistral
pdevine/logging
parth/sample-correctness-fix
parth/sample-fix-sorting
jmorgan/sample-fix-sorting-extras
jmorganca/temp-0-images
brucemacd/parallel-embed-models
brucemacd/shim-grammar
jmorganca/fix-gguf-error
bmizerany/nameswork
jmorganca/faster-releases
bmizerany/validatenames
brucemacd/err-no-vocab
brucemacd/rope-config
brucemacd/err-hint
brucemacd/qwen2_5
brucemacd/logprobs
brucemacd/new_runner_graph_bench
progress-flicker
brucemacd/forward-test
brucemacd/go_qwen2
pdevine/gemma2
jmorganca/add-missing-symlink-eval
mxyng/next-debug
parth/set-context-size-openai
brucemacd/next-bpe-bench
brucemacd/next-bpe-test
brucemacd/new_runner_e2e
brucemacd/new_runner_qwen2
pdevine/convert-cohere2
brucemacd/convert-cli
parth/log-probs
mxyng/next-mlx
mxyng/cmd-history
parth/templating
parth/tokenize-detokenize
brucemacd/check-key-register
bmizerany/grammar
jmorganca/vendor-081b29bd
mxyng/func-checks
jmorganca/fix-null-format
parth/fix-default-to-warn-json
jmorganca/qwen2vl
jmorganca/no-concat
parth/cmd-cleanup-SO
brucemacd/check-key-register-structured-err
parth/openai-stream-usage
parth/fix-referencing-so
stream-tools-stop
jmorganca/degin-1
brucemacd/install-path-clean
brucemacd/push-name-validation
brucemacd/browser-key-register
jmorganca/openai-fix-first-message
jmorganca/fix-proxy
jessegross/sample
parth/disallow-streaming-tools
dhiltgen/remove_submodule
jmorganca/ga
jmorganca/mllama
pdevine/newlines
pdevine/geems-2b
jmorganca/llama-bump
mxyng/modelname-7
mxyng/gin-slog
mxyng/modelname-6
jyan/convert-prog
jyan/quant5
paligemma-support
pdevine/import-docs
jmorganca/openai-context
jyan/paligemma
jyan/p2
jyan/palitest
bmizerany/embedspeedup
jmorganca/llama-vit
brucemacd/allow-ollama
royh/ep-methods
royh/whisper
mxyng/api-models
mxyng/fix-memory
jyan/q4_4/8
jyan/ollama-v
royh/stream-tools
roy-embed-parallel
bmizerany/hrm
revert-5963-revert-5924-mxyng/llama3.1-rope
royh/embed-viz
jyan/local2
jyan/auth
jyan/local
jyan/parse-temp
jmorganca/template-mistral
jyan/reord-g
royh-openai-suffixdocs
royh-imgembed
royh-embed-parallel
jyan/quant4
royh-precision
jyan/progress
pdevine/fix-template
jyan/quant3
pdevine/ggla
mxyng/update-registry-domain
jmorganca/ggml-static
mxyng/create-context
jyan/v0.146
mxyng/layers-from-files
build_dist
bmizerany/noseek
royh-ls
royh-name
timeout
mxyng/server-timestamp
bmizerany/nosillyggufslurps
royh-params
jmorganca/llama-cpp-7c26775
royh-openai-delete
royh-show-rigid
jmorganca/enable-fa
jmorganca/no-error-template
jyan/format
royh-testdelete
bmizerany/fastverify
language_support
pdevine/ps-glitches
brucemacd/tokenize
bruce/iq-quants
bmizerany/filepathwithcoloninhost
mxyng/split-bin
bmizerany/client-registry
jmorganca/if-none-match
native
jmorganca/native
jmorganca/batch-embeddings
jmorganca/initcmake
jmorganca/mm
pdevine/showggmlinfo
modenameenforcealphanum
bmizerany/modenameenforcealphanum
jmorganca/done-reason
jmorganca/llama-cpp-8960fe8
ollama.com
bmizerany/filepathnobuild
bmizerany/types/model/defaultfix
rmdisplaylong
nogogen
bmizerany/x
modelfile-readme
bmizerany/replacecolon
jmorganca/limit
jmorganca/execstack
jmorganca/replace-assets
mxyng/tune-concurrency
jmorganca/testing
whitespace-detection
jmorganca/options
upgrade-all
scratch
cuda-search
mattw/airenamer
mattw/allmodelsonhuggingface
mattw/quantcontext
mattw/whatneedstorun
brucemacd/llama-mem-calc
mattw/faq-context
mattw/communitylinks
mattw/noprune
mattw/python-functioncalling
rename
mxyng/install
pulse
remove-first
editor
mattw/selfqueryingretrieval
cgo
mattw/howtoquant
api
matt/streamingapi
format-config
mxyng/extra-args
shell
update-nous-hermes
cp-model
upload-progress
fix-unknown-model
fix-model-names
delete-fix
insecure-registry
ls
deletemodels
progressbar
readme-updates
license-layers
skip-list
list-models
modelpath
matt/examplemodelfiles
distribution
go-opts
v0.30.0-rc3
v0.30.0-rc2
v0.30.0-rc1
v0.30.0-rc0
v0.23.1
v0.23.1-rc0
v0.23.0
v0.23.0-rc0
v0.22.1
v0.22.1-rc1
v0.22.1-rc0
v0.22.0
v0.22.0-rc1
v0.21.3-rc0
v0.21.2-rc1
v0.21.2
v0.21.2-rc0
v0.21.1
v0.21.1-rc1
v0.21.1-rc0
v0.21.0
v0.21.0-rc1
v0.21.0-rc0
v0.20.8-rc0
v0.20.7
v0.20.7-rc1
v0.20.7-rc0
v0.20.6
v0.20.6-rc1
v0.20.6-rc0
v0.20.5
v0.20.5-rc2
v0.20.5-rc1
v0.20.5-rc0
v0.20.4
v0.20.4-rc2
v0.20.4-rc1
v0.20.4-rc0
v0.20.3
v0.20.3-rc0
v0.20.2
v0.20.1
v0.20.1-rc2
v0.20.1-rc1
v0.20.1-rc0
v0.20.0
v0.20.0-rc1
v0.20.0-rc0
v0.19.0
v0.19.0-rc2
v0.19.0-rc1
v0.19.0-rc0
v0.18.4-rc1
v0.18.4-rc0
v0.18.3
v0.18.3-rc2
v0.18.3-rc1
v0.18.3-rc0
v0.18.2
v0.18.2-rc1
v0.18.2-rc0
v0.18.1
v0.18.1-rc1
v0.18.1-rc0
v0.18.0
v0.18.0-rc2
v0.18.0-rc1
v0.18.0-rc0
v0.17.8-rc4
v0.17.8-rc3
v0.17.8-rc2
v0.17.8-rc1
v0.17.8-rc0
v0.17.7
v0.17.7-rc2
v0.17.7-rc1
v0.17.7-rc0
v0.17.6
v0.17.5
v0.17.4
v0.17.3
v0.17.2
v0.17.1
v0.17.1-rc2
v0.17.1-rc1
v0.17.1-rc0
v0.17.0
v0.17.0-rc2
v0.17.0-rc1
v0.17.0-rc0
v0.16.3
v0.16.3-rc2
v0.16.3-rc1
v0.16.3-rc0
v0.16.2
v0.16.2-rc0
v0.16.1
v0.16.0
v0.16.0-rc2
v0.16.0-rc0
v0.16.0-rc1
v0.15.6
v0.15.5
v0.15.5-rc5
v0.15.5-rc4
v0.15.5-rc3
v0.15.5-rc2
v0.15.5-rc1
v0.15.5-rc0
v0.15.4
v0.15.3
v0.15.2
v0.15.1
v0.15.1-rc1
v0.15.1-rc0
v0.15.0-rc6
v0.15.0
v0.15.0-rc5
v0.15.0-rc4
v0.15.0-rc3
v0.15.0-rc2
v0.15.0-rc1
v0.15.0-rc0
v0.14.3
v0.14.3-rc3
v0.14.3-rc2
v0.14.3-rc1
v0.14.3-rc0
v0.14.2
v0.14.2-rc1
v0.14.2-rc0
v0.14.1
v0.14.0-rc11
v0.14.0
v0.14.0-rc10
v0.14.0-rc9
v0.14.0-rc8
v0.14.0-rc7
v0.14.0-rc6
v0.14.0-rc5
v0.14.0-rc4
v0.14.0-rc3
v0.14.0-rc2
v0.14.0-rc1
v0.14.0-rc0
v0.13.5
v0.13.5-rc1
v0.13.5-rc0
v0.13.4-rc2
v0.13.4
v0.13.4-rc1
v0.13.4-rc0
v0.13.3
v0.13.3-rc1
v0.13.3-rc0
v0.13.2
v0.13.2-rc2
v0.13.2-rc1
v0.13.2-rc0
v0.13.1
v0.13.1-rc2
v0.13.1-rc1
v0.13.1-rc0
v0.13.0
v0.13.0-rc0
v0.12.11
v0.12.11-rc1
v0.12.11-rc0
v0.12.10
v0.12.10-rc1
v0.12.10-rc0
v0.12.9-rc0
v0.12.9
v0.12.8
v0.12.8-rc0
v0.12.7
v0.12.7-rc1
v0.12.7-rc0
v0.12.7-citest0
v0.12.6
v0.12.6-rc1
v0.12.6-rc0
v0.12.5
v0.12.5-rc0
v0.12.4
v0.12.4-rc7
v0.12.4-rc6
v0.12.4-rc5
v0.12.4-rc4
v0.12.4-rc3
v0.12.4-rc2
v0.12.4-rc1
v0.12.4-rc0
v0.12.3
v0.12.2
v0.12.2-rc0
v0.12.1
v0.12.1-rc1
v0.12.1-rc2
v0.12.1-rc0
v0.12.0
v0.12.0-rc1
v0.12.0-rc0
v0.11.11
v0.11.11-rc3
v0.11.11-rc2
v0.11.11-rc1
v0.11.11-rc0
v0.11.10
v0.11.9
v0.11.9-rc0
v0.11.8
v0.11.8-rc0
v0.11.7-rc1
v0.11.7-rc0
v0.11.7
v0.11.6
v0.11.6-rc0
v0.11.5-rc4
v0.11.5-rc3
v0.11.5
v0.11.5-rc5
v0.11.5-rc2
v0.11.5-rc1
v0.11.5-rc0
v0.11.4
v0.11.4-rc0
v0.11.3
v0.11.3-rc0
v0.11.2
v0.11.1
v0.11.0-rc0
v0.11.0-rc1
v0.11.0-rc2
v0.11.0
v0.10.2-int1
v0.10.1
v0.10.0
v0.10.0-rc4
v0.10.0-rc3
v0.10.0-rc2
v0.10.0-rc1
v0.10.0-rc0
v0.9.7-rc1
v0.9.7-rc0
v0.9.6
v0.9.6-rc0
v0.9.6-ci0
v0.9.5
v0.9.4-rc5
v0.9.4-rc6
v0.9.4
v0.9.4-rc3
v0.9.4-rc4
v0.9.4-rc1
v0.9.4-rc2
v0.9.4-rc0
v0.9.3
v0.9.3-rc5
v0.9.4-citest0
v0.9.3-rc4
v0.9.3-rc3
v0.9.3-rc2
v0.9.3-rc1
v0.9.3-rc0
v0.9.2
v0.9.1
v0.9.1-rc1
v0.9.1-rc0
v0.9.1-ci1
v0.9.1-ci0
v0.9.0
v0.9.0-rc0
v0.8.0
v0.8.0-rc0
v0.7.1-rc2
v0.7.1
v0.7.1-rc1
v0.7.1-rc0
v0.7.0
v0.7.0-rc1
v0.7.0-rc0
v0.6.9-rc0
v0.6.8
v0.6.8-rc0
v0.6.7
v0.6.7-rc2
v0.6.7-rc1
v0.6.7-rc0
v0.6.6
v0.6.6-rc2
v0.6.6-rc1
v0.6.6-rc0
v0.6.5-rc1
v0.6.5
v0.6.5-rc0
v0.6.4-rc0
v0.6.4
v0.6.3-rc1
v0.6.3
v0.6.3-rc0
v0.6.2
v0.6.2-rc0
v0.6.1
v0.6.1-rc0
v0.6.0-rc0
v0.6.0
v0.5.14-rc0
v0.5.13
v0.5.13-rc6
v0.5.13-rc5
v0.5.13-rc4
v0.5.13-rc3
v0.5.13-rc2
v0.5.13-rc1
v0.5.13-rc0
v0.5.12
v0.5.12-rc1
v0.5.12-rc0
v0.5.11
v0.5.10
v0.5.9
v0.5.9-rc0
v0.5.8-rc13
v0.5.8
v0.5.8-rc12
v0.5.8-rc11
v0.5.8-rc10
v0.5.8-rc9
v0.5.8-rc8
v0.5.8-rc7
v0.5.8-rc6
v0.5.8-rc5
v0.5.8-rc4
v0.5.8-rc3
v0.5.8-rc2
v0.5.8-rc1
v0.5.8-rc0
v0.5.7
v0.5.6
v0.5.5
v0.5.5-rc0
v0.5.4
v0.5.3
v0.5.3-rc0
v0.5.2
v0.5.2-rc3
v0.5.2-rc2
v0.5.2-rc1
v0.5.2-rc0
v0.5.1
v0.5.0
v0.5.0-rc1
v0.4.8-rc0
v0.4.7
v0.4.6
v0.4.5
v0.4.4
v0.4.3
v0.4.3-rc0
v0.4.2
v0.4.2-rc1
v0.4.2-rc0
v0.4.1
v0.4.1-rc0
v0.4.0
v0.4.0-rc8
v0.4.0-rc7
v0.4.0-rc6
v0.4.0-rc5
v0.4.0-rc4
v0.4.0-rc3
v0.4.0-rc2
v0.4.0-rc1
v0.4.0-rc0
v0.4.0-ci3
v0.3.14
v0.3.14-rc0
v0.3.13
v0.3.12
v0.3.12-rc5
v0.3.12-rc4
v0.3.12-rc3
v0.3.12-rc2
v0.3.12-rc1
v0.3.11
v0.3.11-rc4
v0.3.11-rc3
v0.3.11-rc2
v0.3.11-rc1
v0.3.10
v0.3.10-rc1
v0.3.9
v0.3.8
v0.3.7
v0.3.7-rc6
v0.3.7-rc5
v0.3.7-rc4
v0.3.7-rc3
v0.3.7-rc2
v0.3.7-rc1
v0.3.6
v0.3.5
v0.3.4
v0.3.3
v0.3.2
v0.3.1
v0.3.0
v0.2.8
v0.2.8-rc2
v0.2.8-rc1
v0.2.7
v0.2.6
v0.2.5
v0.2.4
v0.2.3
v0.2.2
v0.2.2-rc2
v0.2.2-rc1
v0.2.1
v0.2.0
v0.1.49-rc14
v0.1.49-rc13
v0.1.49-rc12
v0.1.49-rc11
v0.1.49-rc10
v0.1.49-rc9
v0.1.49-rc8
v0.1.49-rc7
v0.1.49-rc6
v0.1.49-rc4
v0.1.49-rc5
v0.1.49-rc3
v0.1.49-rc2
v0.1.49-rc1
v0.1.48
v0.1.47
v0.1.46
v0.1.45-rc5
v0.1.45
v0.1.45-rc4
v0.1.45-rc3
v0.1.45-rc2
v0.1.45-rc1
v0.1.44
v0.1.43
v0.1.42
v0.1.41
v0.1.40
v0.1.40-rc1
v0.1.39
v0.1.39-rc2
v0.1.39-rc1
v0.1.38
v0.1.37
v0.1.36
v0.1.35
v0.1.35-rc1
v0.1.34
v0.1.34-rc1
v0.1.33
v0.1.33-rc7
v0.1.33-rc6
v0.1.33-rc5
v0.1.33-rc4
v0.1.33-rc3
v0.1.33-rc2
v0.1.33-rc1
v0.1.32
v0.1.32-rc2
v0.1.32-rc1
v0.1.31
v0.1.30
v0.1.29
v0.1.28
v0.1.27
v0.1.26
v0.1.25
v0.1.24
v0.1.23
v0.1.22
v0.1.21
v0.1.20
v0.1.19
v0.1.18
v0.1.17
v0.1.16
v0.1.15
v0.1.14
v0.1.13
v0.1.12
v0.1.11
v0.1.10
v0.1.9
v0.1.8
v0.1.7
v0.1.6
v0.1.5
v0.1.4
v0.1.3
v0.1.2
v0.1.1
v0.1.0
v0.0.21
v0.0.20
v0.0.19
v0.0.18
v0.0.17
v0.0.16
v0.0.15
v0.0.14
v0.0.13
v0.0.12
v0.0.11
v0.0.10
v0.0.9
v0.0.8
v0.0.7
v0.0.6
v0.0.5
v0.0.4
v0.0.3
v0.0.2
v0.0.1
Labels
Clear labels
amd
api
app
bug
build
cli
cloud
compatibility
context-length
create
docker
documentation
embeddings
feature request
feedback wanted
good first issue
gpt-oss
gpu
harmony
help wanted
image
install
intel
js
launch
linux
macos
memory
mlx
model
needs more info
networking
nvidia
ollama.com
performance
pull-request
python
question
registry
rendering
thinking
tools
top
vulkan
windows
wsl
Mirrored from GitHub Pull Request
Milestone
No items
No Milestone
Projects
Clear projects
No project
No Assignees
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/ollama#47986
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @allandclive on GitHub (Feb 15, 2024).
Original GitHub issue: https://github.com/ollama/ollama/issues/2519
Originally assigned to: @dhiltgen on GitHub.
@jmorganca commented on GitHub (Feb 15, 2024):
Hi @allandclive, would it be possible to make sure your virus is up to date? Ollama on Windows preview is a new piece of software, signed with an EV certificate by DigiCert. To state the obvious: no trojan script is packaged with Ollama.
Windows Defender has a history of flagging CUDA libraries (which Ollama includes). Will work to figure out how to make sure this doesn't appear any more.
@allandclive commented on GitHub (Feb 15, 2024):
It's up to date
@fristhon commented on GitHub (Feb 15, 2024):
+1
AFAIK code signing takes some days to get approved by Microsoft
@dhiltgen commented on GitHub (Feb 15, 2024):
Digging around, it seems this false positive is common for Inno Setup based installers.
Since we just got our signing key in the past few days, I'm inclined to wait a little bit to see if this self-corrects. If not, then we may want to take a look at the uninstall aspects here which seem be be what triggers this AV detection logic according to others who have hit this false positive.
@dhiltgen commented on GitHub (Feb 15, 2024):
To test my theory above, I've produced a test build of the installer that removes 2 of plausible uninstall paths (
"{%TEMP}\ollama*"and"{%USERPROFILE}\.ollama") that may be resulting in this AV flag. Would someone who's seen this AV warning be willing to give this installer a try and report back?https://github.com/dhiltgen/ollama/releases/download/v0.1.25/OllamaSetup.exe
@rezonant commented on GitHub (Feb 16, 2024):
For me the file listed on the Github README identifies as
Trojan:Win32/Sabsik.FL.A!mlon Windows Defender (Windows 11).Uploading that to VirusTotal yields no flags: https://www.virustotal.com/gui/file/80f7cb53c6ddba62076bcffabf926e070bec78587ee4a927208165f8afe9afce
I scanned your updated installer and it does not flag Windows Defender for me, but I did upload it to VirusTotal as well and it did hit a flag on Microsoft's AV for
Trojan:Win32/Wacatac.B!mlas originally reported.https://www.virustotal.com/gui/file/68157bfc0a9385a0aaf809e6621a6d6de5219a8444b22573ce483269fc25fe1d/details
@Leonai-do commented on GitHub (Feb 16, 2024):
Kaspersky also detect some files with trojans
@dhiltgen commented on GitHub (Feb 16, 2024):
Thanks for checking!
So it sounds like those two removals didn't resolve the problem. Another plausible cause is the way we carry payloads inside the primary executable, which isn't strictly necessary on windows now, so I'll start exploring a change to carry everything as installer payloads and no nesting inside the ollama binary.
@dhiltgen commented on GitHub (Feb 16, 2024):
I've tried various permutations and our setup installer always triggers the Microsoft AV in virtustotal. The underlying ollama.exe shows clean with or without the nested payloads. Maybe Microsoft just doesn't trust our cert yet.
@rezonant commented on GitHub (Feb 17, 2024):
Sources online say this is common and that having a cert doesn't guarantee you aren't flagged. You need to run your releases through something like VirusTotal to identify any flags, and then submit your executable in a whitelist request to the vendors that flag it. Microsoft has a form for that, for one. After awhile you won't be flagged as your reputation grows. Good luck.
@fristhon commented on GitHub (Feb 17, 2024):
Some useful insights and the form that @rezonant is talking about can be found here
https://learn.microsoft.com/en-us/microsoft-365/security/defender/criteria
@dhiltgen commented on GitHub (Feb 19, 2024):
We've submitted a ticket to Microsoft so hopefully that will work through the system before we cut our next release and fix the false positives.
@jmorganca commented on GitHub (Feb 21, 2024):
Hi all, wanted to post an update. As mentioned by @dhiltgen, we've contacted Microsoft to resolve this false-positive issue. It is common with Go projects (see https://go.dev/doc/faq#virus) and has affected similar projects such as Docker for Windows.
While we work on fixing this with Microsoft (we are in contact with their Security Intelligence team), you can fix the false-positive warning by updating your Windows Defender Virus Definitions:
@David-Woodthorpe commented on GitHub (Feb 21, 2024):
I also just had a trojan warning with Microsoft Defender when trying to update ollama - all virus definitions are up to date

@OMGnotThatGuy commented on GitHub (Feb 21, 2024):
Security intelligence version: 1.405.380.0 still alerts false positive.
@solitaryurt commented on GitHub (Feb 21, 2024):
Same with
v0.1.26@internetscooter commented on GitHub (Feb 21, 2024):
Security intelligence version: 1.405.391.0 still alerts false positive.
Different alert though?
Trojan:Script/Sabsik.FL.A!ml
@solitaryurt commented on GitHub (Feb 21, 2024):
These false positives are very common with Windows Golang binaries unfortunately.
@ewebgh33 commented on GitHub (Feb 22, 2024):
Soooo does it run despite the flag and the file getting quarantined?
For me it's also Trojan:Win32/Wacatac.B!ml
@Lunarisnia commented on GitHub (Feb 22, 2024):
Happened when trying to update
Right now downgrading to 0.1.25 seems to be my only option for it to not be flagged
@ewebgh33 commented on GitHub (Feb 22, 2024):
I tried starting Ollama anyway. It started. BUT
When I start Ollama using WIndows Powershell, is it running the windows one or the WSL one? I would have thought Windows version, because surely only the Ubuntu prompt would start the WSL one.
Bear with me here - the reason I can't tell if it's Windows is:
1.
For
ollama run llama2it starts up pretty quick - it didn't seem to download. So is it running the model file I already downloaded for WSL?I thought the Windows version would have it's models in the users home folder?
I looked, and C:\Users\COMPUTERFACE.ollama has no models in it. So IS it using the WSL models?
(If I download a new model, where will it go? WSL folder or windows version folder?)
Also - there's no Ollama icon in the system tray like the video said there would be for the windows version. So how do I tell if Win version is running?
Maybe this is a dumb question, but given the ambiguities I've listed I am confused.
@nagkumar commented on GitHub (Feb 22, 2024):
Upon an update to this version, virus alert is shown
@Lushy3D commented on GitHub (Feb 22, 2024):
When trying to update to the newest version (v0.1.26), Windows Defender also flagged this as a threat for me on Windows 10.
Interestingly, ollama seems to be version 0.1.26 according to version info and it seems to run commands normally.
[edit] I'm not sure what part of ollama usually runs in the background, but that seems to have been killed by Windows Defender. I'll reinstall v0.1.25 for now since the newest still seems to get flagged.
@schergr commented on GitHub (Feb 22, 2024):
I received the same. Let me know if you need any logs.
@dasjet commented on GitHub (Feb 22, 2024):
Ollama 0.1.26.0
Kaspersky warning
@davidlehub commented on GitHub (Feb 22, 2024):
same for me on windows 11. Not sure if it's really safe to "allow" it to run
@Alias4D commented on GitHub (Feb 22, 2024):
@MisterAG commented on GitHub (Feb 22, 2024):
Exact same error message as Alias4D above on my Win11 box, latest virus updates.
@metathron commented on GitHub (Feb 22, 2024):
I got the same Trojan warning
@jmorganca commented on GitHub (Feb 23, 2024):
Hi folks, we're almost done resolving this with Microsoft. 2/3 of the binaries included with Ollama no longer seem to be triggering false alarms, one more to go and we have an ongoing ticket with Microsoft for it.
Thanks for your patience and I'm so sorry for the alert.
@ahmedhamdy78 commented on GitHub (Feb 23, 2024):
@jmorganca commented on GitHub (Feb 23, 2024):
Hi all, this should be much improved for the time being. I'm going to close this, with a plan to re-open it should it become a problem again. Note: it may take some time for the Windows Defender definitions to update to account for this (although all machines where I was able to reproduce it have stopped showing alerts at this point).
To everyone who hit this issue: I'm sorry and understand how shocking it might have been in the moment. I hope it doesn't deter you from giving Ollama on Windows another try.
Many more improvements to Windows to come!
@ewebgh33 commented on GitHub (Feb 24, 2024):
@jmorganca Will the new installer resolve the ambiguities I detailed in my message above?
My initial theory was that incomplete installation (due to virus being flagged) meant I never saw the system tray icon appear, hence not opening a new issue for this. I could never tell if the installation actually completed or not, when the virus was flagged, and I'm waiting on a new installer to try reinstalling.
Pasting the original comment here, so you don't have to scroll up:
When I start Ollama using WIndows Powershell, is it running the windows one or the WSL one? I would have thought Windows version, because surely only the Ubuntu prompt would start the WSL one.
Bear with me here - the reason I can't tell if it's Windows is:
1.
For ollama run llama2 it starts up pretty quick - it didn't seem to download. So is it running the model file I already downloaded for WSL?
I thought the Windows version would have it's models in the users home folder?
I looked, and C:\Users\COMPUTERFACE.ollama has no models in it. So IS it using the WSL models?
(If I download a new model, where will it go? WSL folder or windows version folder?)
Also - there's no Ollama icon in the system tray like the video said there would be for the windows version. So how do I tell if Win version is running?
Maybe this is a dumb question, but given the ambiguities I've listed I am confused.
@dotysan commented on GitHub (Feb 24, 2024):
Hi @EmmaWebGH, I'm new here too. But happen to have learned the answers to your questions from recently reading the source and docs. https://github.com/ollama/ollama/blob/main/docs/faq.md
If the false-threat got blocked/quarantined, you'll need to uninstall and try again with a newer release--and after updating your MS Defender crud.
PowerShell is Windows not WSL. WSL is bash by default.
https://github.com/ollama/ollama/blob/main/docs/faq.md#where-are-models-stored
This is likely due to the quarantine/blocking. See above.
There are no dumb questions.
I've been able to use it by downloading the source and compiling from scratch. No Defender alerts!
Not to tricky, but does require you carefully satisfy all the dependencies--some not fully documented yet. https://github.com/ollama/ollama/blob/main/docs/development.md#windows
@jphat commented on GitHub (Feb 24, 2024):
ollama 0.1.27 and intelligence 1.405.505.0 produces no errors for me
@ewebgh33 commented on GitHub (Feb 25, 2024):
@dotysan
You're saying if it was quarantined it WOULDN'T start? Because it did. A file was supposedly quarantined and yet I can run llama2 from Powershell.
Thanks for the link to where the models are stored / docs.
But... there are no models in that folder! (nothing in Windows: C:\Users<username>.ollama\models)
And yet... Ollama started and ran llama2 it started and responded to prompts.
Hence my confusion, and I'm still confused.
@dotysan commented on GitHub (Feb 25, 2024):
I did not say that.
This issue about the false-positive is closed. If you have another issue, open a new one.
If you are curious about the client/server architecture of the ollama Go binary (as I was), read the source, documentation, or watch some videos about it. https://www.youtube.com/@technovangelist
@boessu commented on GitHub (May 13, 2024):
Today I've got a warning from Windows Defender that ollama app.exe is infected with Trojan:Win32/Wacatac.H!ml. Is that a false positive too?
@dhiltgen commented on GitHub (May 13, 2024):
Sorry you hit this. We've submitted the latest release binaries to the false positive site to get it resolved.
@dhiltgen commented on GitHub (May 31, 2024):
I haven't heard and fresh reports of false positives, so I'll close this.
@mhubregtse commented on GitHub (Aug 1, 2024):
Hi today i wanted to install ollama on a Bitdefender protected machine, it triggers as a trojan Atc4.Detection.
So it seems the problem has returned ?
@dhiltgen commented on GitHub (Aug 1, 2024):
@mhubregtse can you share which ollama version, and which file triggered the AV detection?
@dhiltgen commented on GitHub (Aug 2, 2024):
We'll get the latest binaries submitted to msft to clear up the false positive. We recently updated Go versions so that likely explains why it's popping up again.
@dhiltgen commented on GitHub (Aug 9, 2024):
It should be clear by now. If anyone is still seeing the false positive pop up, please let us know.
@aios-ai commented on GitHub (Aug 13, 2024):
Just today I got the first false-positive detection:

@pschaer commented on GitHub (Aug 13, 2024):
same here:

@mfarme commented on GitHub (Aug 13, 2024):
Same here

Edition Windows 11 Home
Version 23H2
Installed on 7/2/2023
OS build 22635.4010
Experience Windows Feature Experience Pack 1000.22700.1035.0
@xaydras-2 commented on GitHub (Aug 13, 2024):
I updated ollama, before it finishes, window detected a Trojan. It did finish downloading

@TraoreMorike commented on GitHub (Aug 13, 2024):
Hello,
Same here :
Windows 11 Pro 23H2
@livioenrico commented on GitHub (Aug 14, 2024):
For me the same today:
@dhiltgen commented on GitHub (Aug 14, 2024):
@livioenrico please confirm this was version 0.3.5 that was flagged, correct? 0.3.6 shouldn't trigger the false positive.
@jpaveg commented on GitHub (Aug 14, 2024):
For me, 0.3.6 was flagged. It triggered after hitting 'restart to update'.
@dhiltgen commented on GitHub (Sep 3, 2024):
@jpaveg or others, are you still seeing AV false positives with the latest versions?
@jpaveg commented on GitHub (Sep 3, 2024):
I haven't seen any false positives since reinstalling.
@mfarme commented on GitHub (Sep 3, 2024):
@dhiltgen updated today and no issues.
@xaydras-2 commented on GitHub (Sep 3, 2024):
Since the last update, there isn't any false positive
@jaseva commented on GitHub (Sep 17, 2024):
Tried downloading today and received this warning:

https://ollama.com/download
@dhiltgen commented on GitHub (Sep 17, 2024):
I've confirmed the 0.3.10 (currently latest) binary is signed with our signing key, and uploaded it to Virus Total, and it reports clean (including McAffee's VT integration)
@jaseva do you have the latest definitions installed from McAfee?
@jaseva commented on GitHub (Sep 17, 2024):
Hi @dhiltgen, I only have the McAfee WebAdvisor Extension plugin installed in Microsoft Edge and I do not see any section to manually update the definitions. I assume the definitions are managed automically. My browser and extension are up to date.
@dhiltgen commented on GitHub (Sep 17, 2024):
I tried to submit our installer to their portal for false positive disputes, but it doesn't accept large files so I was unable to complete the process. @jaseva if you have an account with McAfee, can you try to upload?
@jaseva commented on GitHub (Sep 17, 2024):
Hi @dhiltgen I submitted a form to McAfee asking that they check the software and update the definitions for their WebAdvisor tool. I'll update this ticket when they reply. The upload form would only accept a maximum file size of 500 MB.