Comprehensive GDPR compliance auditing that analyzes static code files, database schemas, and configurations for EU data protection regulation compliance. Includes 8 reference documents and 5 automated scanning tools.
Audits codebases and configurations for GDPR compliance, analyzing data collection, storage, and processing practices against EU regulations.
/plugin marketplace add diegocconsolini/ClaudeSkillCollection/plugin install gdpr-auditor@security-compliance-marketplaceThis skill provides comprehensive guidance for auditing systems and codebases for GDPR compliance.
The GDPR auditor skill equips Claude with specialized knowledge to:
Use this skill when:
Do NOT use this skill for:
This skill analyzes static files only (source code, configuration files, database schema files, documentation). For live system testing or runtime analysis, consult qualified security professionals.
This skill generates a GDPR Compliance Audit Report in Markdown format.
Report Structure:
# GDPR Compliance Audit Report
Generated: [Date]
Application: [Name/Description]
Audited by: GDPR Auditor Skill
## Executive Summary
- Overall Compliance Status: [Compliant / Partially Compliant / Non-Compliant]
- Critical Issues: [Number]
- High Priority Issues: [Number]
- Overall Risk Level: [Low / Medium / High / Critical]
- Primary Concerns: [Brief list]
## Critical Issues
[Issues requiring immediate attention]
1. [Issue Title]
- **GDPR Article(s):** [Relevant articles]
- **File/Location:** [file.py:line or description]
- **Risk:** Critical
- **Finding:** [Detailed description]
- **Recommendation:** [Specific remediation steps]
## High-Priority Recommendations
[Important improvements needed for compliance]
## Medium-Priority Recommendations
[Suggested enhancements and best practices]
## Compliant Areas
[Aspects that meet GDPR requirements - positive findings]
## Data Subject Rights Assessment
- Right to Access: [Implemented / Not Implemented / Partial]
- Right to Rectification: [Status]
- Right to Erasure: [Status]
- Right to Data Portability: [Status]
- Right to Object: [Status]
## Compliance Roadmap
**Phase 1 (Immediate - 0-30 days):**
[Critical fixes]
**Phase 2 (Short-term - 1-3 months):**
[High-priority items]
**Phase 3 (Medium-term - 3-6 months):**
[Enhancements and optimizations]
## GDPR Articles Referenced
[List of GDPR articles cited in findings]
## Next Steps
[Prioritized action items]
Deliverable: A comprehensive, actionable audit report with specific code references, GDPR article citations, and prioritized remediation guidance.
Start by understanding the scope of the audit:
When analyzing codebase files and configurations, examine:
Data Collection Points (Source Code Analysis)
scripts/scan_data_collection.py to automatically identify data collection patterns in source filesData Storage (Schema File Analysis)
scripts/analyze_database_schema.py to review database schema files and migration scriptsData Processing
Data Subject Rights
scripts/check_dsr_implementation.py to verify data subject rights implementationSecurity Measures
scripts/security_audit.py to check security implementationsWhen detailed information is needed, load relevant reference documents:
references/gdpr_articles.md - Complete GDPR articles and requirementsreferences/personal_data_categories.md - Categories of personal data and special categoriesreferences/legal_bases.md - Legal bases for processing and when to use eachreferences/dsr_requirements.md - Data subject rights implementation requirementsreferences/security_measures.md - Technical and organizational security measuresreferences/breach_procedures.md - Data breach notification requirementsreferences/dpia_guidelines.md - When and how to conduct DPIAsreferences/international_transfers.md - Rules for international data transfersStructure audit findings using the following format:
For each finding, include:
Follow these principles when conducting audits:
Always verify the following common compliance issues:
The skill includes Python scripts for static file analysis in the scripts/ directory:
Important: All scripts work with static files only (source code, schemas, configuration files). They do NOT:
Execute scripts when relevant to automate parts of the audit process. Scripts are defensive security tools designed to identify compliance issues for remediation, not to exploit systems.
This skill is designed exclusively for defensive security purposes: identifying compliance gaps, recommending improvements, and helping organizations protect personal data. Do not use this skill to exploit vulnerabilities, harvest data, or circumvent security measures.
Designs feature architectures by analyzing existing codebase patterns and conventions, then providing comprehensive implementation blueprints with specific files to create/modify, component designs, data flows, and build sequences