Compliance and governance skill. Activates when user needs to verify regulatory compliance (GDPR, HIPAA, SOC2, PCI-DSS), design audit trails, implement privacy controls, manage data retention policies, or audit license compliance across dependencies. Systematically evaluates codebase against regulatory frameworks, produces findings with evidence and remediation, and generates compliance documentation. Triggers on: /godmode:comply, "GDPR compliance", "audit trail", "are we compliant?", "privacy review", or when shipping features that handle personal data.
From godmodenpx claudepluginhub arbazkhan971/godmodeThis skill uses the workspace's default tool permissions.
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Enables AI agents to execute x402 payments with per-task budgets, spending controls, and non-custodial wallets via MCP tools. Use when agents pay for APIs, services, or other agents.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
/godmode:comply/godmode:ship detects regulated data flowsDetermine which regulations and what code is in scope:
COMPLIANCE SCOPE:
Target: <feature/module/entire project>
Applicable regulations:
- [ ] GDPR (personal data of EU residents)
- [ ] HIPAA (protected health information)
- [ ] SOC2 (service organization controls)
- [ ] PCI-DSS (payment card data)
- [ ] CCPA (California consumer privacy)
- [ ] FERPA (educational records)
- [ ] Other: <specify>
Data classification:
Personal data: <files/modules handling PII>
Sensitive data: <files/modules handling health/financial/auth data>
Public data: <files/modules with non-sensitive data>
If personal data of EU residents is processed:
GDPR — LAWFUL BASIS ASSESSMENT:
| Data Processing Activity | Lawful Basis | Status |
|--|--|--|
| User registration | Consent | COMPLIANT |
| Order processing | Contract | COMPLIANT |
| Marketing emails | Consent | MISSING |
| Analytics tracking | Legitimate int. | REVIEW |
| Fraud detection | Legitimate int. | COMPLIANT |
GDPR — DATA SUBJECT RIGHTS:
| Right | Implemented | Location |
|--|--|--|
| Right to access | YES/NO | <endpoint/UI> |
| Right to rectification | YES/NO | <endpoint/UI> |
| Right to erasure | YES/NO | <endpoint/UI> |
| Right to portability | YES/NO | <endpoint/UI> |
| Right to restrict proc. | YES/NO | <endpoint/UI> |
| Right to object | YES/NO | <endpoint/UI> |
| Automated decision-making | YES/NO/N/A | <endpoint/UI> |
CONSENT IMPLEMENTATION CHECK:
- [ ] Consent is freely given (not bundled with service access)
- [ ] Consent is specific (separate consent per purpose)
- [ ] Consent is informed (clear language, not legalese)
- [ ] Consent is unambiguous (affirmative action, no pre-ticked boxes)
- [ ] Consent is withdrawable (easy opt-out, same effort as opt-in)
- [ ] Consent records stored (who, when, what, version of terms)
- [ ] Under-16 users: parental consent mechanism exists
If protected health information (PHI) is processed:
HIPAA — SAFEGUARDS ASSESSMENT:
| Safeguard | Status | Evidence |
ADMINISTRATIVE SAFEGUARDS
| Risk analysis conducted | YES/NO | <ref> |
|--|--|--|
| Workforce access controls | YES/NO | <ref> |
| Security awareness training | YES/NO | <ref> |
| Incident response procedures | YES/NO | <ref> |
| Business associate agreements | YES/NO | <ref> |
PHYSICAL SAFEGUARDS
| Facility access controls | YES/NO | <ref> |
|--|--|--|
| Workstation security | YES/NO | <ref> |
| Device and media controls | YES/NO | <ref> |
If operating as a service organization:
SOC2 — TRUST SERVICES CRITERIA:
| Category | Controls | Implemented | Gaps |
|--|--|--|--|
| Security | 12 | <N> | <N> |
| Availability | 8 | <N> | <N> |
| Processing Integr. | 6 | <N> | <N> |
| Confidentiality | 7 | <N> | <N> |
| Privacy | 10 | <N> | <N> |
Key SOC2 Controls:
- [ ] Change management process documented and followed
- [ ] Logical access controls with least privilege
- [ ] Encryption in transit and at rest
- [ ] Monitoring and alerting for security events
- [ ] Incident response plan tested within last 12 months
If payment card data is processed:
PCI-DSS — REQUIREMENTS CHECK:
| Requirement | Status |
|--|--|
| 1. Network security controls | PASS/FAIL |
| 2. Secure configuration | PASS/FAIL |
| 3. Protect stored account data | PASS/FAIL |
| 4. Encrypt transmission over networks | PASS/FAIL |
| 5. Protect from malicious software | PASS/FAIL |
| 6. Secure systems and software | PASS/FAIL |
| 7. Restrict access by business need | PASS/FAIL |
| 8. Identify users and auth access | PASS/FAIL |
| 9. Restrict physical access | PASS/FAIL/N/A |
| 10. Log and monitor all access | PASS/FAIL |
| 11. Test security regularly | PASS/FAIL |
Verify that all security and compliance events are logged:
AUDIT TRAIL ASSESSMENT:
| Event Category | Logged | Fields |
|--|--|--|
| Authentication | YES/NO | who, when, IP, result |
| Authorization changes | YES/NO | who, what, when, by-whom |
| Data access (read) | YES/NO | who, what, when |
| Data modification | YES/NO | who, what, old, new |
| Data deletion | YES/NO | who, what, when, reason |
| Data export | YES/NO | who, what, format, dest |
| Configuration changes | YES/NO | who, what, old, new |
| System errors | YES/NO | what, when, severity |
| Admin operations | YES/NO | who, what, when |
Verify data lifecycle management:
DATA RETENTION POLICY:
| Data Category | Retention | Auto-delete | Method |
|--|--|--|--|
| User accounts | Active+2y | YES/NO | <method> |
| Transaction logs | 7 years | YES/NO | <method> |
| Session data | 30 days | YES/NO | <method> |
| Audit logs | 3 years | YES/NO | <method> |
| Analytics data | 1 year | YES/NO | <method> |
| Backup data | 90 days | YES/NO | <method> |
| Temporary files | 24 hours | YES/NO | <method> |
Deletion workflow:
- [ ] Deletion request → verification → execution → confirmation
- [ ] Deletion cascades to all copies (backups, caches, replicas)
- [ ] Deletion is verifiable (can prove data no longer exists)
Audit dependencies: MIT/Apache/BSD/ISC = safe. LGPL = review. GPL/AGPL = replace or verify no copyleft trigger. Unlicensed = investigate/replace. Verify NOTICE/LICENSE files included in distribution.
COMPLIANCE AUDIT REPORT
Regulations assessed:
GDPR: <COMPLIANT | PARTIAL | NON-COMPLIANT>
HIPAA: <COMPLIANT | PARTIAL | NON-COMPLIANT | N/A>
SOC2: <COMPLIANT | PARTIAL | NON-COMPLIANT | N/A>
PCI-DSS: <COMPLIANT | PARTIAL | NON-COMPLIANT | N/A>
Findings:
CRITICAL: <N> (must fix before launch)
HIGH: <N> (must fix within 30 days)
MEDIUM: <N> (should fix within 90 days)
LOW: <N> (best practice, not required)
docs/compliance/<date>-compliance-audit.md"comply: <scope> — <verdict> (<N> findings across <regulations>)"/godmode:fix to remediate."/godmode:ship."# Run compliance checks
npx license-checker --production --failOn "GPL-3.0;AGPL-3.0"
grep -rn "email\|ssn\|password" src/ --include="*.ts" | head -20
git log --oneline --since="30 days" -- docs/compliance/
IF CRITICAL findings > 0: block launch until resolved. WHEN HIGH findings > 0: remediation plan with < 30 day SLA. IF license scan finds GPL/AGPL in proprietary code: replace immediately.
| Flag | Description |
|---|---|
| (none) | Full compliance audit across all applicable regulations |
--gdpr | GDPR compliance check only |
--hipaa | HIPAA compliance check only |
timestamp regulation scope critical high medium low verdict
FOR each applicable regulation:
1. Scan codebase for data flows
2. Check controls against requirements
3. For each NON_COMPLIANT finding: record with evidence
4. STOP when all regulations assessed
On activation, automatically detect compliance scope:
AUTO-DETECT:
1. Data types handled:
grep -r "email\|password\|ssn\|credit.card\|phone\|address\|dob\|birth" src/ --include="*.ts" --include="*.py" -l
2>/dev/null
# Determines: PII present -> GDPR/CCPA scope
2. Health data:
grep -ri "patient\|diagnosis\|medical\|health\|phi\|hipaa" src/ -l 2>/dev/null
# Determines: PHI present -> HIPAA scope
3. Payment data:
grep -ri "stripe\|payment\|credit.card\|pan\|cvv\|billing" src/ -l 2>/dev/null
# Determines: Payment data -> PCI-DSS scope
4. Existing compliance artifacts:
Every comply invocation must produce a structured report:
COMPLIANCE RESULT
Regulations assessed: <list>
GDPR: <COMPLIANT | PARTIAL | NON-COMPLIANT | N/A>
HIPAA: <COMPLIANT | PARTIAL | NON-COMPLIANT | N/A>
SOC2: <COMPLIANT | PARTIAL | NON-COMPLIANT | N/A>
PCI-DSS: <COMPLIANT | PARTIAL | NON-COMPLIANT | N/A>
Findings: <N>C <N>H <N>M <N>L
Audit trail: <COMPLETE | PARTIAL | MISSING>
License risk: <CLEAR | REVIEW NEEDED | RISK>
Verdict: <COMPLIANT | CONDITIONAL | NON-COMPLIANT>
KEEP if: improvement verified. DISCARD if: regression or no change. Revert discards immediately.
Stop when: target reached, budget exhausted, or >5 consecutive discards.