compliance-audit

Performs regulatory gap analysis across 7 compliance frameworks with a scored report card and prioritized remediation roadmap. Use when assessing a website or application for GDPR, CCPA, ADA, PCI-DSS, CAN-SPAM, COPPA, or SOC 2 compliance. Trigger with "/compliance-audit" or "audit my website for regulatory compliance".

1,868 stars

Best use case

compliance-audit is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Performs regulatory gap analysis across 7 compliance frameworks with a scored report card and prioritized remediation roadmap. Use when assessing a website or application for GDPR, CCPA, ADA, PCI-DSS, CAN-SPAM, COPPA, or SOC 2 compliance. Trigger with "/compliance-audit" or "audit my website for regulatory compliance".

Teams using compliance-audit should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/compliance-audit/SKILL.md --create-dirs "https://raw.githubusercontent.com/jeremylongshore/claude-code-plugins-plus-skills/main/plugins/business-tools/general-legal-assistant/skills/compliance-audit/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/compliance-audit/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How compliance-audit Compares

Feature / Agentcompliance-auditStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Performs regulatory gap analysis across 7 compliance frameworks with a scored report card and prioritized remediation roadmap. Use when assessing a website or application for GDPR, CCPA, ADA, PCI-DSS, CAN-SPAM, COPPA, or SOC 2 compliance. Trigger with "/compliance-audit" or "audit my website for regulatory compliance".

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

Related Guides

SKILL.md Source

# Regulatory Compliance Audit

## Overview

Executes a two-phase compliance analysis — detection scan followed by framework-by-framework
evaluation — across 7 regulatory frameworks. Produces a compliance scorecard with letter
grades (A-F) per framework, identifies specific gaps, and generates a prioritized
remediation roadmap with effort estimates and timelines.

This skill reads and analyzes existing assets. It does not generate legal documents or
modify any files. The output is an audit report documenting findings and recommendations.

> **Legal Disclaimer:** This skill generates AI-assisted compliance analysis for
> informational purposes only. It does not constitute legal advice, certification, or
> attestation of compliance. Regulatory requirements are complex and jurisdiction-specific.
> All findings should be reviewed by qualified legal counsel and/or certified compliance
> professionals. No attorney-client relationship is created by using this tool.

## Prerequisites

- A live website URL or local codebase to analyze
- Access to any existing privacy policy, terms of service, or compliance documentation
- Knowledge of the business type, target audience, and geographic reach

## Instructions

### Phase 1: Detection Scan

1. **Scan the website.** Use WebFetch on the target URL to collect:
   - HTML source (meta tags, structured data, accessibility attributes)
   - Cookie and tracking behavior (Set-Cookie headers, JavaScript trackers)
   - Form elements (input types, required fields, consent checkboxes)
   - Payment indicators (payment form fields, processor scripts)
   - Third-party scripts and embeds (analytics, advertising, social)
   - SSL/TLS certificate presence
   - Content targeting indicators (age-related content, children's themes)

2. **Scan the codebase (if available).** Use Glob and Grep to find:
   - Privacy policy and terms of service files
   - Cookie consent implementation code
   - Authentication and access control patterns
   - Data encryption at rest and in transit
   - Logging and audit trail implementations
   - Age verification or gate mechanisms
   - Email sending code and unsubscribe handling
   - Payment processing integrations
   - Accessibility attributes (aria-*, alt text, semantic HTML)

3. **Build the detection inventory.** Create a structured map of findings:

   | Category | Signals Found | Frameworks Triggered |
   |----------|---------------|---------------------|
   | Data Collection | Forms, cookies, analytics | GDPR, CCPA |
   | Payments | Stripe, PayPal, card fields | PCI-DSS |
   | Accessibility | Missing alt text, no skip nav | ADA/WCAG |
   | Email Marketing | Newsletter signup, email sends | CAN-SPAM |
   | User Demographics | Age gates, child-oriented content | COPPA |
   | Security Controls | Auth, encryption, logging | SOC 2 |

### Phase 2: Framework-by-Framework Evaluation

4. **Evaluate each applicable framework.** Score against these criteria:

   **GDPR (General Data Protection Regulation)**
   - [ ] Privacy policy published and accessible
   - [ ] Legal basis documented for each processing activity
   - [ ] Cookie consent with granular opt-in (not just notice)
   - [ ] Data subject rights mechanism (access, erasure, portability)
   - [ ] Data Processing Agreement with third-party processors
   - [ ] Data breach notification procedure documented
   - [ ] Data Protection Impact Assessment for high-risk processing
   - [ ] Records of processing activities maintained
   - [ ] International transfer safeguards (SCCs, adequacy decisions)
   - [ ] DPO appointed (if required by Article 37)

   **CCPA/CPRA (California Consumer Privacy Act)**
   - [ ] "Do Not Sell or Share My Personal Information" link visible
   - [ ] Privacy policy discloses categories of personal information collected
   - [ ] Consumer request mechanism (access, delete, correct, opt-out)
   - [ ] Service provider agreements with data sharing restrictions
   - [ ] Financial incentive disclosures (if offering loyalty programs)
   - [ ] Sensitive personal information opt-out mechanism
   - [ ] Annual privacy policy update
   - [ ] Employee/applicant privacy notices (if applicable)

   **ADA/WCAG 2.1 (Accessibility)**
   - [ ] Alt text on all images
   - [ ] Keyboard navigation support
   - [ ] Color contrast ratios (4.5:1 minimum for text)
   - [ ] Form labels and error messages
   - [ ] Skip navigation links
   - [ ] ARIA landmarks and roles
   - [ ] Video captions and audio descriptions
   - [ ] Responsive design / mobile accessibility

   **PCI-DSS (Payment Card Industry)**
   - [ ] No card data stored in plaintext
   - [ ] Payment processing via certified processor (Stripe, Braintree)
   - [ ] HTTPS enforced on all payment pages
   - [ ] No card numbers in URLs, logs, or error messages
   - [ ] SAQ (Self-Assessment Questionnaire) type determined
   - [ ] Quarterly vulnerability scans (if applicable)

   **CAN-SPAM (Commercial Email)**
   - [ ] Physical mailing address in marketing emails
   - [ ] Functional unsubscribe mechanism
   - [ ] Unsubscribe honored within 10 business days
   - [ ] Accurate "From" and "Subject" headers
   - [ ] Commercial content clearly identified
   - [ ] No harvested or purchased email lists

   **COPPA (Children's Online Privacy Protection)**
   - [ ] Age screening mechanism (if content may attract children under 13)
   - [ ] Verifiable parental consent before collecting children's data
   - [ ] Direct notice to parents about data practices
   - [ ] Parental review and deletion rights
   - [ ] Data minimization for children's data
   - [ ] No behavioral advertising to children

   **SOC 2 (Trust Services Criteria)**
   - [ ] Access controls and authentication (Security)
   - [ ] System monitoring and alerting (Availability)
   - [ ] Data encryption and integrity checks (Processing Integrity)
   - [ ] Privacy policy aligned with commitments (Privacy)
   - [ ] Data handling and retention policies (Confidentiality)
   - [ ] Incident response plan documented
   - [ ] Vendor management program
   - [ ] Change management procedures

5. **Calculate compliance scores.** For each framework:
   - Count the criteria met vs. total applicable criteria
   - Calculate a percentage score
   - Assign a letter grade:

   | Grade | Score | Meaning |
   |-------|-------|---------|
   | A | 90-100% | Substantially compliant |
   | B | 75-89% | Minor gaps, low risk |
   | C | 60-74% | Moderate gaps, action needed |
   | D | 40-59% | Significant gaps, priority remediation |
   | F | 0-39% | Non-compliant, immediate action required |

6. **Generate remediation roadmap.** For each gap, provide:
   - Description of the gap
   - Regulatory risk (fine amounts, enforcement precedents)
   - Remediation action with specific steps
   - Effort estimate (hours: 1-4, 4-16, 16-40, 40+)
   - Priority tier: P0 (immediate), P1 (30 days), P2 (90 days), P3 (6 months)
   - Suggested responsible party (legal, engineering, marketing, ops)

7. **Compile the audit report** using the output format below.

## Output

Generate a single Markdown file named `COMPLIANCE-AUDIT-{company}-{YYYY-MM-DD}.md`:

```
# Regulatory Compliance Audit
**{Company Name}** — {URL or codebase path}

**Audit Date:** {date}
**Auditor:** AI Compliance Scan (Legal Assistant Plugin)
**Scope:** {frameworks evaluated}

---

## Executive Summary
{3-5 sentence overview of compliance posture, highest-risk areas, and top recommendation}

## Compliance Scorecard

| Framework | Score | Grade | Status |
|-----------|-------|-------|--------|
| GDPR | {%} | {A-F} | {Compliant / Gaps Found / Non-Compliant} |
| CCPA/CPRA | {%} | {A-F} | {status} |
| ADA/WCAG 2.1 | {%} | {A-F} | {status} |
| PCI-DSS | {%} | {A-F} | {status} |
| CAN-SPAM | {%} | {A-F} | {status} |
| COPPA | {%} | {A-F} | {status} |
| SOC 2 | {%} | {A-F} | {status} |
| **Overall** | **{%}** | **{grade}** | |

## Detection Inventory
{table of all signals detected during Phase 1}

## Detailed Findings

### GDPR
{criteria-by-criteria evaluation with PASS/FAIL/N-A}

### CCPA/CPRA
{criteria-by-criteria evaluation}

{... remaining frameworks ...}

## Remediation Roadmap

### P0 — Immediate (This Week)
| # | Gap | Framework | Action | Effort | Owner |
|---|-----|-----------|--------|--------|-------|
{high-risk items}

### P1 — Short-Term (30 Days)
{moderate-risk items}

### P2 — Medium-Term (90 Days)
{lower-risk items}

### P3 — Long-Term (6 Months)
{enhancement items}

## Risk Exposure Summary
{estimated fine exposure per framework based on published enforcement ranges}

---

**Frameworks Not Applicable:** {list with reason}
**Limitations:** AI scan cannot detect server-side controls, review organizational policies,
or assess physical security. This audit supplements but does not replace professional
compliance assessment.
**Generated by:** Legal Assistant Plugin — Not a substitute for legal counsel.
```

## Error Handling

| Error | Cause | Solution |
|-------|-------|----------|
| Website unreachable | URL down, behind auth, or blocked | Ask for codebase path or manual description of features |
| Framework not applicable | Business does not trigger certain regulations | Mark as N/A with explanation, exclude from overall score |
| Cannot assess server-side | No codebase access, only URL | Note limitation, recommend server-side review separately |
| Mixed signals on COPPA | Cannot determine if audience includes children | Flag for manual review, apply COPPA criteria conservatively |
| Payment processing unclear | Redirects to external checkout | Note processor, limit PCI-DSS scope to integration points |
| Existing policies not found | No privacy policy or ToS published | Score as F for policy-dependent criteria, flag as P0 |

## Examples

**Example 1: E-Commerce Website**

Request: "Audit https://example-shop.com for compliance"

Result: `COMPLIANCE-AUDIT-ExampleShop-2026-04-02.md` with:
- GDPR: C (68%) — privacy policy exists but missing granular consent, no DPA with Shopify
- CCPA: D (45%) — no "Do Not Sell" link, no consumer request mechanism
- ADA/WCAG: B (82%) — good semantic HTML, missing alt text on 12 product images
- PCI-DSS: A (95%) — Stripe checkout handles card data, HTTPS enforced
- CAN-SPAM: B (78%) — unsubscribe works, missing physical address
- COPPA: N/A — adult products only
- SOC 2: N/A — not pursuing certification
- Remediation: 14 items across P0-P2, estimated 120 hours total

**Example 2: SaaS Application Codebase**

Request: "Run a compliance audit on our codebase at ./src"

Result: `COMPLIANCE-AUDIT-SaaSApp-2026-04-02.md` with:
- GDPR: D (52%) — no data processing records, no breach notification procedure
- CCPA: C (65%) — basic privacy controls exist, missing sensitive data handling
- ADA/WCAG: F (35%) — minimal ARIA attributes, no keyboard navigation, poor contrast
- PCI-DSS: B (80%) — Stripe integration clean, but card-related strings in logs
- CAN-SPAM: A (92%) — proper unsubscribe, physical address, clear headers
- COPPA: N/A
- SOC 2: D (48%) — no incident response plan, minimal access controls
- Remediation: 23 items, accessibility overhaul as top P0

## Resources

- [ICO GDPR Guidance](https://ico.org.uk/for-organisations/guide-to-data-protection/) — UK Information Commissioner's Office
- [California Attorney General CCPA](https://oag.ca.gov/privacy/ccpa) — Official CCPA guidance and enforcement
- [FTC CAN-SPAM Compliance Guide](https://www.ftc.gov/business-guidance/resources/can-spam-act-compliance-guide-business) — Federal requirements
- [W3C WCAG 2.1 Guidelines](https://www.w3.org/TR/WCAG21/) — Web accessibility standards
- [PCI Security Standards Council](https://www.pcisecuritystandards.org/) — Payment card security standards
- [FTC COPPA Rule](https://www.ftc.gov/legal-library/browse/rules/childrens-online-privacy-protection-rule-coppa) — Children's privacy requirements
- [AICPA SOC 2 Trust Services Criteria](https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/sorhome) — SOC 2 framework

Related Skills

assisting-with-soc2-audit-preparation

1868
from jeremylongshore/claude-code-plugins-plus-skills

Execute automate SOC 2 audit preparation including evidence gathering, control assessment, and compliance gap identification. Use when you need to prepare for SOC 2 audits, assess Trust Service Criteria compliance, document security controls, or generate readiness reports. Trigger with phrases like "SOC 2 audit preparation", "SOC 2 readiness assessment", "collect SOC 2 evidence", or "Trust Service Criteria compliance".

generating-security-audit-reports

1868
from jeremylongshore/claude-code-plugins-plus-skills

Generate comprehensive security audit reports for applications and systems. Use when you need to assess security posture, identify vulnerabilities, evaluate compliance status, or create formal security documentation. Trigger with phrases like "create security audit report", "generate security assessment", "audit security posture", or "PCI-DSS compliance report".

validating-pci-dss-compliance

1868
from jeremylongshore/claude-code-plugins-plus-skills

Validate PCI-DSS compliance for payment card data security. Use when auditing payment systems. Trigger with 'validate PCI-DSS', 'check payment security', or 'audit card data'.

checking-owasp-compliance

1868
from jeremylongshore/claude-code-plugins-plus-skills

Check compliance with OWASP Top 10 security risks and best practices. Use when performing comprehensive security audits. Trigger with 'check OWASP compliance', 'audit web security', or 'validate OWASP'.

checking-hipaa-compliance

1868
from jeremylongshore/claude-code-plugins-plus-skills

Check HIPAA compliance for healthcare data security requirements. Use when auditing healthcare applications. Trigger with 'check HIPAA compliance', 'validate health data security', or 'audit PHI protection'.

scanning-for-gdpr-compliance

1868
from jeremylongshore/claude-code-plugins-plus-skills

Scan for GDPR compliance issues in data handling and privacy practices. Use when ensuring EU data protection compliance. Trigger with 'scan GDPR compliance', 'check data privacy', or 'validate GDPR'.

generating-compliance-reports

1868
from jeremylongshore/claude-code-plugins-plus-skills

Generate comprehensive compliance reports for security standards. Use when creating compliance documentation. Trigger with 'generate compliance report', 'compliance status', or 'audit compliance'.

Auditing Access Control

1868
from jeremylongshore/claude-code-plugins-plus-skills

Audit access control implementations for security vulnerabilities and misconfigurations. Use when reviewing authentication and authorization. Trigger with 'audit access control', 'check permissions', or 'validate authorization'.

windsurf-audit-logging

1868
from jeremylongshore/claude-code-plugins-plus-skills

Configure AI interaction audit logging for compliance. Activate when users mention "audit logging", "compliance logging", "ai interaction logs", "security audit", or "activity tracking". Handles compliance and audit configuration. Use when analyzing or auditing windsurf audit logging. Trigger with phrases like "windsurf audit logging", "windsurf logging", "windsurf".

openrouter-compliance-review

1868
from jeremylongshore/claude-code-plugins-plus-skills

Review OpenRouter integration for regulatory compliance (SOC2, GDPR, HIPAA). Use when preparing for audits, evaluating data handling, or documenting compliance posture. Triggers: 'openrouter compliance', 'openrouter gdpr', 'openrouter soc2', 'openrouter data residency'.

openrouter-audit-logging

1868
from jeremylongshore/claude-code-plugins-plus-skills

Implement audit logging for OpenRouter API calls. Use when building compliance trails, debugging production issues, or tracking model usage. Triggers: 'openrouter audit', 'openrouter logging', 'audit trail openrouter', 'log openrouter requests'.

klingai-compliance-review

1868
from jeremylongshore/claude-code-plugins-plus-skills

Security and compliance review framework for Kling AI integrations. Use when preparing for audits or reviewing security posture. Trigger with phrases like 'klingai compliance', 'kling ai security review', 'klingai audit prep', 'video generation compliance'.