Gemma 4 "Cracked" Status: Which Model Was Modified, What Changed, and What Risk You Take
As of April 6, 2026: the main community 'cracked' target is google/gemma-4-31B-it derivatives on Hugging Face, with refusal behavior intentionally removed.
As of April 6, 2026: the main community 'cracked' target is google/gemma-4-31B-it derivatives on Hugging Face, with refusal behavior intentionally removed.
As of April 6, 2026, the community “cracked/uncensored” discussion is mainly about derivatives of google/gemma-4-31B-it.
This post is only about the concrete facts you care about:
The main target in public model cards is:
google/gemma-4-31B-itThe biggest wave is around this 31B instruct checkpoint and its derivatives.
The commonly claimed change is:
In several model cards, maintainers explicitly describe refusal-removal methods and provide before/after refusal metrics.
Reported by maintainers:
In plain terms: it answers more prompts that base instruct versions would reject.
Examples you can directly verify right now:
TrevorJS/gemma-4-31B-it-uncensoredTrevorJS/gemma-4-31B-it-uncensored-GGUFdealignai/Gemma-4-31B-JANG_4M-UncensoredTxemAI/gemma-4-31B-uncensored-heretic-mlx-8bitlactroiii/gemma-4-31b-it-abliteratedwangzhang/gemma-4-31B-it-abliteratedmirxa2/Gemma-4-31B-XEven if the model is publicly downloadable, your risk does not disappear:
Gemma derivatives are still under Gemma terms constraints, including prohibited-use rules and distribution obligations.
If your product produces illegal, infringing, or harmful output, responsibility stays with deployers/operators.
Using high-risk uncensored variants can fail enterprise review, ad platform policy checks, or app-store compliance.
Lower refusal increases abuse surface for jailbreak-style prompts and malicious user attempts unless you add your own guardrails.
For the current “Gemma 4 cracked” narrative, the core fact is simple:
google/gemma-4-31B-it derivatives to reduce refusal behavior.