From wicked-garden
Compliance analysis for regulatory frameworks (SOC2, HIPAA, GDPR, PCI). Checks code and architecture against compliance requirements, detects violations, and provides remediation guidance. Use when: "compliance check", "SOC2", "HIPAA", "GDPR", "PCI", "regulatory requirements", "is this compliant", "compliance gap"
npx claudepluginhub mikeparcewski/wicked-garden --plugin wicked-gardenThis skill uses the workspace's default tool permissions.
Analyze code and systems for regulatory compliance.
Provides Ktor server patterns for routing DSL, plugins (auth, CORS, serialization), Koin DI, WebSockets, services, and testApplication testing.
Conducts multi-source web research with firecrawl and exa MCPs: searches, scrapes pages, synthesizes cited reports. For deep dives, competitive analysis, tech evaluations, or due diligence.
Provides demand forecasting, safety stock optimization, replenishment planning, and promotional lift estimation for multi-location retailers managing 300-800 SKUs.
Analyze code and systems for regulatory compliance.
| Framework | Focus | Key Requirements |
|---|---|---|
| SOC2 | Security, Availability | Access controls, encryption, logging, monitoring |
| HIPAA | Protected Health Info | PHI safeguards, access logs, encryption, BAA |
| GDPR | Personal Data | Consent, minimization, deletion, DPO |
| PCI DSS | Payment Card Data | Encryption, network segmentation, access control |
See refs/frameworks.md for detailed framework requirements.
/wicked-garden:platform:compliance [--framework soc2|hipaa|gdpr|pci] [--quick]
Scan for:
Access Control:
Data Protection:
Logging & Monitoring:
Data Lifecycle:
Common issues:
See refs/checklists.md for detailed verification checklists.
Output:
Auto-triggered at phase gates
TaskUpdate(
taskId="{task_id}",
description="{previous}\n\n[compliance] {framework}: {status}"
)
/wicked-garden:mem:recall "compliance {framework}"
/wicked-garden:platform:security {target}
## Compliance Analysis: {Framework}
**Target**: {scope}
**Status**: {COMPLIANT|NEEDS ATTENTION|NON-COMPLIANT}
**Framework**: {SOC2|HIPAA|GDPR|PCI}
### Critical (P0)
- {violation} - {file}:{line}
Remediation: {fix}
### High Priority (P1)
- {gap} - {file}:{line}
Recommendation: {guidance}
### Medium Priority (P2)
- {improvement} - {suggestion}
### Controls Verified
- [x] Encryption at rest
- [ ] Data retention policy
### Next Steps
{Recommended actions}
Use compliance checker:
sh "${CLAUDE_PLUGIN_ROOT}/scripts/_python.sh" "${CLAUDE_PLUGIN_ROOT}/scripts/compliance_checker.py" \
--target {path} \
--framework {soc2|hipaa|gdpr|pci}
Compliance checking can leverage available integrations by capability:
| Capability | Discovery Patterns | Provides |
|---|---|---|
| Security scanning | snyk, semgrep, sast | Vulnerability detection |
| Secrets | vault, secrets | Credential management audit |
| SBOM | trivy, sbom, cyclonedx | Supply chain compliance |
Discover available integrations via capability detection. Fall back to local compliance_checker.py when none available.
Good analysis:
Bad analysis: