Scans codebases for GDPR compliance issues like consent flows, erasure rights, data transfers, and processing agreements. Generates reports with gaps and remediation recommendations.
npx claudepluginhub jeremylongshore/claude-code-plugins-plus-skills --plugin gdpr-compliance-scannerThis skill is limited to using the following tools:
Scan codebases and infrastructure for GDPR compliance violations, checking data processing agreements, consent flows, right-to-erasure implementations, and cross-border data transfer safeguards.
Provides step-by-step guidance for GDPR compliance scanner operations, generates configurations, and validates outputs against standards. Useful for security tasks involving GDPR, pentesting, and threat modeling.
Checks code against OWASP Top 10, CWE, NIST, PCI-DSS, HIPAA, GDPR, and secure coding practices. Generates compliance reports with checklists and gap analysis.
Conducts security audits on code, infrastructure, and configs: vulnerability scans (OWASP Top 10), compliance checks (HIPAA, PCI DSS, GDPR, SOC 2), cryptography reviews. Use for assessing security posture.
Share bugs, ideas, or general feedback.
Scan codebases and infrastructure for GDPR compliance violations, checking data processing agreements, consent flows, right-to-erasure implementations, and cross-border data transfer safeguards.
This skill allows Claude to automatically assess an application's GDPR compliance posture. It provides a comprehensive scan, identifying potential violations and offering actionable recommendations to improve compliance. The skill simplifies the complex process of GDPR auditing, making it easier to identify and address critical gaps.
gdpr-compliance-scanner plugin.This skill activates when you need to:
User request: "Scan my web application for GDPR compliance."
The skill will:
gdpr-compliance-scanner plugin.User request: "Check our data processing activities for GDPR compliance."
The skill will:
gdpr-compliance-scanner plugin.This skill can be integrated with other security and compliance tools to provide a holistic view of an application's security posture. It can also be used in conjunction with code generation tools to automatically implement recommended changes and improve GDPR compliance.
If security scanning fails: