From wicked-garden
Audit evidence collection and trail verification. Gathers artifacts, validates controls, generates audit reports, and maintains compliance documentation. Use when: "audit trail", "collect evidence", "audit report", "control testing", "compliance documentation"
npx claudepluginhub mikeparcewski/wicked-garden --plugin wicked-gardenThis skill uses the workspace's default tool permissions.
Collect evidence and verify audit trails for compliance.
Provides Ktor server patterns for routing DSL, plugins (auth, CORS, serialization), Koin DI, WebSockets, services, and testApplication testing.
Conducts multi-source web research with firecrawl and exa MCPs: searches, scrapes pages, synthesizes cited reports. For deep dives, competitive analysis, tech evaluations, or due diligence.
Provides demand forecasting, safety stock optimization, replenishment planning, and promotional lift estimation for multi-location retailers managing 300-800 SKUs.
Collect evidence and verify audit trails for compliance.
/wicked-garden:platform:audit [--controls] [--trail] [--report]
Identify audit targets:
Code Evidence:
Configuration Evidence:
Documentation Evidence:
Operational Evidence:
See refs/checklists-soc2-hipaa.md, refs/checklists-gdpr-pci-evidence.md, and refs/checklists-evidence-operations.md for comprehensive evidence checklists.
Test each control:
# Check encryption
grep -r "encrypt\|cipher\|AES\|TLS" {target}
# Check access controls
grep -r "authorize\|authenticate\|require.*auth" {target}
# Check audit logging
grep -r "log\|audit\|event" {target}
See refs/frameworks-soc2-hipaa.md and refs/frameworks-gdpr-pci.md for framework-specific control testing procedures.
Identify:
Create report with:
| Type | Description | Examples |
|---|---|---|
| Design | Architecture | Diagrams, specs, policies |
| Implementation | Code | Functions, configs, tests |
| Operational | Runtime | Logs, metrics, incidents |
| Process | Procedural | Approvals, reviews, training |
Attach audit evidence by appending to the task description (reference file paths checked into the repo):
TaskUpdate(
taskId="{task_id}",
description="{previous}\n\n## Audit Evidence: {control_id}\nEvidence file: {evidence_path}"
)
Find related evidence:
/wicked-garden:search:code "audit|logging|encrypt" --path {target}
## Audit Report: {Framework}
**Status**: {READY|NEEDS WORK|NOT READY}
**Controls Tested**: {count} | **Gaps**: {count}
### Controls Tested
| ID | Status | Evidence |
|----|--------|----------|
| CC6.1 | PASS | auth.py:15 |
| CC7.2 | FAIL | Missing |
### Evidence
- Design: docs/arch.md
- Code: src/auth.py, src/crypto.py
- Operational: /var/log/audit.log
### Critical Gaps (P0)
1. Missing admin audit trail
2. No TLS for PII endpoints
### Recommendations
1. Fix P0 gaps before certification
2. Schedule follow-up audit
Good audit evidence:
Bad audit evidence: