Help us improve
Share bugs, ideas, or general feedback.
From ai-governance-legal
Manages an EU AI Act per-system inventory tracking roles and risk tiers. Use for adding, listing, editing, or classifying AI systems under the EU AI Act.
npx claudepluginhub anthropics/claude-for-legal --plugin ai-governance-legalHow this skill is triggered — by the user, by Claude, or both
Slash command
/ai-governance-legal:ai-inventory [list | add | edit <id> | classify <id> | show <id>][list | add | edit <id> | classify <id> | show <id>]The summary Claude sees in its skill listing — used to decide when to auto-load this skill
The user wants to manage their AI system inventory under the EU AI Act. The
Manages EU AI Act per-system inventory tracking roles (provider, deployer, etc.) and risk tiers (prohibited, high-risk, etc.) per AI system, not per company.
Guides AI governance and compliance including EU AI Act risk classification, NIST AI RMF assessments, responsible AI principles, ethics reviews, and regulatory requirements for AI systems.
Conducts AI governance and responsible AI assessments using EU AI Act and NIST AI RMF, with risk classification, compliance evaluation, ethical reviews, and remediation roadmaps.
Share bugs, ideas, or general feedback.
The user wants to manage their AI system inventory under the EU AI Act. The core idea the skill exists to enforce: role and tier are per-system, not per-company. A single organization can be a provider of System A, a deployer of System B, and an importer of System C. Each combination triggers a different set of obligations under the AI Act. The inventory exists so those assessments are tracked where you can find them — the obligations themselves are derived in conversation, not from a table.
Read the config. Read
~/.claude/plugins/config/claude-for-legal/ai-governance-legal/CLAUDE.md.
If it doesn't exist or still has [PLACEHOLDER] markers, direct the user
to /ai-governance-legal:cold-start-interview first.
Read the inventory. Inventory lives at
~/.claude/plugins/config/claude-for-legal/ai-governance-legal/ai-systems.yaml.
If it doesn't exist, create it with an empty systems: list when the
first add runs.
Dispatch on the argument:
list → show the inventory table (see List below).add → run the Add flow.edit <id> → show the current record, ask what to change, update one
field, confirm, write.classify <id> → run the Classification walk-through on an
existing record, updating role, tier, role_basis, and tier_basis.show <id> → show the full record.On list, offer the dashboard: "Want the full dashboard? Filter by status / tier / EU nexus / owner. Say the word."
Close every action with a hook into the lawyer's work. After any write, say:
Recorded. When you're ready to walk through obligations for this system, just ask — I'll do it in-conversation and flag where the AI Act article mapping needs your verification. I don't derive obligations from a table because the mapping is complex and changing.
Render as a compact table:
| ID | Name | Owner | Status | EU nexus | Role | Tier | Next review |
|---|---|---|---|---|---|---|---|
| sys-001 | Resume screening | HR / Jamie | in_production | yes | deployer | high_risk | 2026-08-01 |
| sys-002 | Email drafting assistant | IT / Priya | in_production | no | deployer | limited | 2026-12-01 |
Under the table, show counts by tier and a line: "N systems flagged for review within 30 days."
Ask, one field at a time (or accept a paste). The required fields are
name, owner, description, status, eu_nexus. The rest can be
deferred — say so explicitly: "you can come back to classification with
/ai-governance-legal:ai-inventory classify <id>."
planned | in_development | in_production | deprecated.Assign an ID: sys-NNN where NNN is the next integer in the file.
The walk-through produces role, role_basis, tier, tier_basis. Both
bases are tagged [verify against current AI Act text] — not because the
skill is hedging, but because the article mapping is complex and the AI
Act is still phasing in. The lawyer owns verification.
Who does what to this system?
Options, with the distinguishing test:
Dual-role flag. If the user substantially modifies a vendor system
(fine-tunes on their own data, changes the intended purpose, rebrands),
they may become a provider of the modified system even if they started
as a deployer. Call this out when they describe any modification beyond
configuration. [verify against current AI Act text — Article 25, provider obligations and substantial modification]
Write the role. Write role_basis in one sentence.
What does the system do, and does the use case fall into a regulated category?
Check in order:
A. Article 5 prohibited practices. [verify against current AI Act text — Article 5]
Summaries, not definitive text:
If matched → tier is prohibited. Flag the use case as stop and route to
the governance team's prohibited-practice workflow.
B. Annex III high-risk areas. [verify against current AI Act text — Annex III]
Summaries:
If matched → tier is high_risk. Note the Annex III area and subsection.
C. GPAI. [verify against current AI Act text — Article 51 and surrounding]
D. Limited risk. Chatbots interacting with natural persons, deepfakes, emotion recognition and biometric categorization systems outside Article 5 scope — transparency obligations apply.
E. Minimal risk. Everything else.
Write the tier. Write tier_basis in one sentence, citing the article or
Annex entry that matched, tagged [verify against current AI Act text].
Offer three next steps:
/ai-governance-legal:aia-generation to produce a full
impact assessment?"systems:
- id: sys-001
name: "Resume screening tool"
owner: "HR / Jamie"
description: "Filters inbound CVs against job criteria"
status: in_production # planned | in_development | in_production | deprecated
eu_nexus: true # deployed, offered, or affects people in the EU/EEA
role: deployer # provider | deployer | importer | distributor | authorized_rep | product_manufacturer
role_basis: "We license from VendorX and deploy internally [verify against current AI Act text]"
tier: high_risk # prohibited | high_risk | limited | minimal | gpai | gpai_systemic
tier_basis: "Annex III(4)(a) — employment, recruitment selection [verify against current AI Act text]"
obligations_assessed: false
obligations_note: "To assess: as deployer of a high-risk system — human oversight, input data quality, monitoring, record-keeping, informing workers, FRIA if public body/service — see Article 26 [verify against current AI Act text]"
next_review: "2026-08-01"
review_trigger: "on substantial modification or annually"
created: "2026-05-11"
updated: "2026-05-11"
The inventory stores role, tier, and the basis for each. It does NOT contain a hardcoded role × tier → obligations table.
When the user asks "what are my obligations for System X?", the skill
does the analysis in conversation, tagged [verify], and routes to
/ai-governance-legal:aia-generation for the formal impact assessment
if needed.
This is deliberate:
[verify] tags stay. They are not hedging — they are the point.
Do not strip them in outputs./ai-inventory classify —
modification can change role./aia-generation for anything that needs
a formal record.