Overview
check runs a full hardware analysis and scores compatible models across four dimensions: Quality, Speed, Fit, and Context. It is the primary command for answering “what can I run on this machine right now?”
Example Output
Flags
Filter and weight recommendations by use case. Accepted values:
general, coding, chat, reasoning, multimodal, embeddings, creative.Default: generalSpecify the inference runtime. Accepted values:
ollama, vllm, mlx, llama.cpp.Default: ollamaNumber of compatible models to display in output.Default:
1Path to a
policy.yaml file. Evaluates all candidate models against enterprise governance rules and reports violations.Disable the step-by-step progress display. Useful for scripting and CI environments.
Maximum model size to consider. Accepts
B (parameters) or GB format, e.g. 30B or 15GB.Minimum model size to consider. Accepts
B or GB format, e.g. 7B or 4GB.Include cloud-hosted models in the analysis in addition to local Ollama models.
Simulate a hardware profile instead of detecting real hardware. Use
--simulate list to see all available profiles.Custom GPU model for hardware simulation, e.g.
"RTX 5060" or "RX 7800 XT".Custom RAM in GB for hardware simulation, e.g.
32.Custom CPU model for hardware simulation, e.g.
"AMD Ryzen 7 5700X".Override GPU VRAM in GB for simulation. Requires
--gpu.Show detailed hardware information in the output.
Filter results by model type.
Only show models that are available in the Ollama registry.
Run active performance benchmarks against installed models. Produces real tok/s measurements instead of hardware-estimated speeds.
Show a detailed breakdown of Ollama model analysis in the output.
Use Case Examples
Scoring System
check uses the deterministic 4D scoring engine. Weights are adjusted by use case:
| Category | Quality | Speed | Fit | Context |
|---|---|---|---|---|
general | 45% | 35% | 15% | 5% |
coding | 55% | 20% | 15% | 10% |
reasoning | 60% | 10% | 20% | 10% |
multimodal | 50% | 15% | 20% | 15% |
Policy Enforcement
When--policy <file> is supplied, check evaluates all compatible and marginal candidates discovered during analysis — not just the models shown in the --limit output.
- In audit mode, policy violations are reported but the command exits with
0. - In enforce mode, blocking violations cause a non-zero exit (default
1). - Override the exit code with
enforcement.exit_codeinpolicy.yaml.

