From appsec
This skill should be used when the user asks to "check for non-compliance", "analyze GDPR compliance", "find CCPA violations", "check HIPAA compliance", "audit regulatory requirements", or mentions "non-compliance" in a privacy context. Maps to LINDDUN category N2. No STRIDE equivalent exists.
npx claudepluginhub florianbuetow/claude-code --plugin appsecThis skill uses the workspace's default tool permissions.
Analyze source code for regulatory non-compliance where data processing activities
Acquire memory dumps from live systems/VMs and analyze with Volatility 3 for processes, networks, DLLs, injections in incident response or malware hunts.
Provides x86-64/ARM disassembly patterns, calling conventions, control flow recognition for static analysis of executables and compiled binaries.
Identifies anti-debugging checks like IsDebuggerPresent, NtQueryInformationProcess in Windows binaries; suggests bypasses via patches/hooks/scripts for malware analysis, CTFs, authorized RE.
Analyze source code for regulatory non-compliance where data processing activities violate GDPR, CCPA, or HIPAA. Non-compliance results from missing technical controls, incorrect legal bases, or unimplemented data subject rights. This category has no STRIDE equivalent and is unique to privacy threat modeling.
Read ../../shared/schemas/flags.md for full flag
documentation. This skill supports all cross-cutting flags.
| Flag | Non-Compliance-Specific Behavior |
|---|---|
--scope | Default changed. Focuses on files containing data retention, deletion logic, consent management, cross-border transfers, age verification, and processing records. |
--depth quick | Grep patterns only: scan for missing deletion endpoints, hardcoded retention, and cross-border transfers. |
--depth standard | Full code read, check data lifecycle implementation against regulatory requirements. |
--depth deep | Trace data flows across storage layers. Verify deletion cascades through databases, backups, caches, and logs. |
--depth expert | Deep + regulatory audit simulation: assess compliance posture against GDPR, CCPA, and HIPAA article by article. |
--severity | Filter output. Missing data subject rights are high; documentation gaps are medium. |
--fix | Generate retention enforcement, deletion cascades, and consent management implementations. |
LINDDUN N2 -- Non-compliance
Non-compliance occurs when data processing activities violate applicable privacy
regulations. Read ../../shared/frameworks/linddun.md
for the full framework reference including regulatory mappings.
Privacy Property Violated: Regulatory Compliance | STRIDE Mapping: No equivalent | OWASP: A04:2021 (Insecure Design)
--scope flag (default: changed).Read each scoped file and assess regulatory compliance:
At --depth deep or --depth expert, trace the complete data lifecycle and
verify compliance at every stage from collection through deletion.
Output findings per ../../shared/schemas/findings.md.
Each finding needs: NCMPL-NNN id, title, severity (based on regulatory penalty
risk and affected data subjects), location with snippet, description of unmet
regulatory requirement, impact (penalties and liability), fix (technical control
implementation), and CWE/LINDDUN/regulatory article references.
retention|ttl|time.to.live|cleanup|purge|expire|cron.*delete|scheduled.*removaldeleteUser|removeUser|eraseUser|destroyUser|delete.*account|purge.*userwithdraw.*consent|revoke.*consent|opt.out|unsubscribe|consent.*revoke|removeConsentregion.*us-east|endpoint.*amazonaws|storage.*googleapis|azure.*region|cloudflareage.*verify|date.of.birth|dateOfBirth|minAge|age.*gate|parental.*consent|COPPA|under.*13days.*=.*365|retention.*=.*30|ttl.*=.*90|expire.*=.*\d+|keep.*days|max.*age.*=restrict.*processing|pause.*processing|freeze.*account|suspend.*data|processing.*holdbreach.*notify|incident.*report|security.*alert|data.*breach|notify.*authority| Regulation | Provision | Relevance |
|---|---|---|
| GDPR Art. 5-6 | Processing principles, lawful bases | Lawfulness, purpose limitation, data minimization |
| GDPR Art. 8 | Child's consent | Parental consent required for minors |
| GDPR Art. 17-18, 20 | Erasure, restriction, portability | Data subject rights implementation |
| GDPR Art. 28, 30 | Processor requirements, ROPA | DPAs and records of processing activities |
| GDPR Art. 33-35 | Breach notification, DPIA | 72-hour notification, impact assessments |
| GDPR Art. 44-49 | Cross-border transfers | Adequacy decisions, SCCs, or BCRs required |
| CCPA 1798.105, .120 | Right to delete, opt-out | Consumer deletion and sale opt-out |
| HIPAA 164.404, .530 | Breach notification, admin | PHI safeguards and breach notification |
Use finding ID prefix NCMPL (e.g., NCMPL-001, NCMPL-002).
All findings follow the schema in
../../shared/schemas/findings.md with:
references.cwe: CWE-359 (Exposure of Private Information)references.owasp: A04:2021 (Insecure Design -- missing regulatory controls)metadata.tool: "non-compliance"metadata.framework: "linddun"metadata.category: "N2"Summary table after all findings:
| Non-Compliance Pattern | Critical | High | Medium | Low |
|-------------------------------|----------|------|--------|-----|
| Missing data retention | | | | |
| Incomplete deletion | | | | |
| Missing consent management | | | | |
| Cross-border transfers | | | | |
| Missing data subject rights | | | | |
| Missing age verification | | | | |
| Missing breach notification | | | | |
Followed by: top 3 priorities, compliance posture summary, and overall assessment.