← Back to Skills
📋

Compliance Checker

Verify adherence to regulatory and organizational policies across code and configurations

Operations 4 steps 4 tools 2 servers

Example Prompt

Check our application for GDPR compliance — flag any PII handling issues, missing consent flows, or data retention violations

About

Checks your codebase and configurations against regulatory compliance requirements (SOC 2, GDPR, HIPAA, PCI-DSS). Reads source files and configs to identify non-compliant patterns — such as unencrypted PII storage, missing access controls, or inadequate logging — then maps each finding to a specific policy control and generates an audit-ready compliance report.

Workflow Steps

1

List project structure to identify configs, data handlers, auth modules, and logging setups

📁 List Directory
2

Read code and config files to detect non-compliant patterns (unencrypted PII, missing access controls, inadequate logging)

📄 Read File
3

Map each finding to a specific regulatory control and assess compliance gap severity

🧠 Structured Reasoning
4

Generate an audit-ready compliance report with control mappings, evidence, and remediation guidance

✏️ Write File

Tags

compliancegdprsoc2hipaapolicyauditgovernance