Skip to content

Compliance Health Scanner - Like Lynis, but for regulations. The Diaper Protocol for busy parents.

Notifications You must be signed in to change notification settings

jaspertvdm/tibet-audit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

9 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

TIBET Audit

SSL secures the connection. TIBET secures the timeline.

PyPI version License: MIT

Compliance Health Scanner - Like Lynis, but for regulations.

45 checks across 10 frameworks covering GDPR, AI Act, PIPA, APPI, PDPA, LGPD, Gulf PDPL, NDPR, and more.

Get a compliance health score in seconds:

$ tibet-audit scan
COMPLIANCE HEALTH SCORE: 73/100 (Grade: C)

TOP PRIORITIES:
  1. [CRITICAL] No AI decision logging found (EU AI Act requires this!)
  2. [HIGH] No data breach procedure found (GDPR requires 72-hour notification!)
  3. [MEDIUM] No explicit data retention policy found

πŸ’‘ 3 issue(s) can be auto-fixed:
   tibet-audit fix --auto  (Diaper Protocolβ„’)

The Diaper Protocolβ„’

For when you have one hand on the baby and one on the keyboard.

# Preview what would be fixed (safe, no changes)
$ tibet-audit fix --wet-wipe

# 🍼 Fix everything, no questions asked
$ tibet-audit fix --auto

# 😭 When things are REALLY bad - verbose mode
$ tibet-audit scan --cry

# πŸ“ž When you can't handle it alone - call for backup
$ tibet-audit call-mama --webhook https://slack.webhook.url

The Full Diaper Toolkit

Flag What it does When to use
--wet-wipe Preview fixes (dry-run) Before changing anything
--auto Fix everything automatically 3 AM, one hand on baby
--cry Verbose mode, all details When everything is on fire
--call-mama Call M.A.M.A. (Mission Assurance & Monitoring Agent) When the diaper is too dirty

Why "Diaper Protocol"?

Because compliance shouldn't require your full attention. Press the button, hands free, server fixed. Just like changing a diaper at 3 AM - you do it on autopilot.

Why "--wet-wipe"?

Because --dry-run is boring. And because wet wipes are essential for both diapers AND clean servers.

Why "--cry"?

Because sometimes you just need to see EVERYTHING. All the passed checks, all the failed checks, all the references, all the fix commands. When the compliance diaper explodes, you need the full picture.

Why "--call-mama"?

M.A.M.A. = Mission Assurance & Monitoring Agent

Because when the diaper is too dirty to handle alone, you call for backup. M.A.M.A. generates a full compliance report and sends it to your team, your Slack channel, or your compliance officer. When things get serious, you need the big guns.


Installation

pip install tibet-audit

With TIBET vault integration (for cryptographic audit trails):

pip install "tibet-audit[tibet]"

Usage

Scan for Issues

# Scan current directory
tibet-audit scan

# Scan specific project
tibet-audit scan ./my-ai-project

# Scan only GDPR checks
tibet-audit scan --categories gdpr

# Scan only AI Act checks
tibet-audit scan --categories ai_act

# Quiet mode (just the score)
tibet-audit scan --quiet

Fix Issues

# Interactive mode (asks for confirmation)
tibet-audit fix

# Preview what would be fixed
tibet-audit fix --wet-wipe
tibet-audit fix --dry-run  # (boring alias)

# 🍼 Diaper Protocol: fix everything automatically
tibet-audit fix --auto

List Available Checks

# Show all checks
tibet-audit list

# Filter by category
tibet-audit list --category gdpr
tibet-audit list --category ai_act

Call Mama (Send Report)

# Send report to webhook (Slack, Teams, etc.)
tibet-audit call-mama --webhook https://hooks.slack.com/xxx

# Save report to file
tibet-audit call-mama --output compliance-report.json

# Print report to stdout
tibet-audit call-mama

Cry Mode (Verbose)

# See EVERYTHING - passed checks, references, fix commands
tibet-audit scan --cry

Available Checks

GDPR Compliance

Check ID Name Severity Auto-Fix
GDPR-001 Privacy Policy Document HIGH βœ…
GDPR-002 Data Retention Policy HIGH βœ…
GDPR-003 Breach Notification Procedure CRITICAL βœ…
GDPR-004 Data Encryption HIGH ❌
GDPR-005 Consent Management HIGH ❌

EU AI Act Compliance

Check ID Name Severity Auto-Fix
AIACT-001 AI Decision Audit Trail CRITICAL βœ…
AIACT-002 Human Oversight HIGH ❌
AIACT-003 AI Transparency HIGH ❌
AIACT-004 AI Risk Assessment HIGH βœ…

πŸ‡°πŸ‡· South Korea PIPA Compliance

Check ID Name Severity Auto-Fix
PIPA-001 Privacy Officer Designation CRITICAL βœ…
PIPA-002 24-Hour Breach Notification CRITICAL βœ…
PIPA-003 Explicit Consent (Opt-in) HIGH ❌
PIPA-004 Cross-Border Transfer Docs HIGH ❌

Note: PIPA is often stricter than GDPR - 24-hour breach notification vs 72 hours!

πŸ‡―πŸ‡΅ Japan APPI Compliance

Check ID Name Severity Auto-Fix
APPI-001 Privacy Policy (APPI) HIGH βœ…
APPI-002 Data Handling Records HIGH βœ…
APPI-003 Cross-Border Transfer Rules HIGH ❌
APPI-004 Pseudonymization Support MEDIUM ❌
APPI-005 Opt-Out Mechanism HIGH ❌

πŸ‡ΈπŸ‡¬ Singapore PDPA Compliance

Check ID Name Severity Auto-Fix
PDPA-001 Consent Obligation HIGH ❌
PDPA-002 Data Protection Officer HIGH βœ…
PDPA-003 3-Day Breach Notification CRITICAL βœ…
PDPA-004 Do Not Call Compliance MEDIUM ❌
PDPA-005 Data Retention Limitation HIGH ❌

πŸ‡¦πŸ‡Ί Australia Privacy Act Compliance

Check ID Name Severity Auto-Fix
AUPA-001 Privacy Policy (APP 1) HIGH βœ…
AUPA-002 Notifiable Data Breach CRITICAL βœ…
AUPA-003 Cross-Border Disclosure HIGH ❌
AUPA-004 Data Security (APP 11) HIGH ❌
AUPA-005 Access & Correction Rights HIGH ❌

πŸ‡§πŸ‡· Brazil LGPD Compliance

Check ID Name Severity Auto-Fix
LGPD-001 Legal Basis for Processing HIGH ❌
LGPD-002 Encarregado (DPO) HIGH βœ…
LGPD-003 Data Subject Rights (ARCO) HIGH ❌
LGPD-004 Breach Notification CRITICAL βœ…

πŸ‡ΈπŸ‡¦πŸ‡¦πŸ‡ͺ Gulf PDPL Compliance (Saudi Arabia, UAE)

Check ID Name Severity Auto-Fix
GULF-001 Data Localization CRITICAL ❌
GULF-002 Explicit Consent HIGH ❌
GULF-003 Breach Notification CRITICAL βœ…
GULF-004 Sensitive Data Protection HIGH ❌

Note: Gulf region has strict data localization requirements - data often must stay in-region!

πŸ‡³πŸ‡¬ Nigeria NDPR Compliance

Check ID Name Severity Auto-Fix
NDPR-001 Consent Requirement HIGH ❌
NDPR-002 Data Protection Officer HIGH ❌
NDPR-003 72-Hour Breach Notification CRITICAL βœ…
NDPR-004 Annual Audit Compliance HIGH βœ…

Note: NDPR uniquely requires annual data protection audits filed with NITDA!

🐧 Penguin Act (Antarctica)

For McMurdo Station and beyond...

Check ID Name Severity Auto-Fix
PENG-001 Penguin Data Sovereignty HIGH ❌
PENG-002 Ice Age Data Retention LOW ❌
PENG-003 Blizzard Resilience MEDIUM ❌
PENG-004 Krill Consent Framework LOW βœ…
PENG-005 Aurora Australis Logging INFO ❌

Easter egg for our Antarctic friends. 🐧


Global Coverage Summary

45 checks across 10 compliance frameworks covering all inhabited continents:

Region Framework Checks Key Feature
πŸ‡ͺπŸ‡Ί Europe GDPR 5 72-hour breach notification
πŸ‡ͺπŸ‡Ί Europe AI Act 4 AI decision audit trails
πŸ‡°πŸ‡· South Korea PIPA 4 24-hour breach notification
πŸ‡―πŸ‡΅ Japan APPI 5 Pseudonymization support
πŸ‡ΈπŸ‡¬ Singapore PDPA 5 Do Not Call registry
πŸ‡¦πŸ‡Ί Australia Privacy Act 5 Notifiable Data Breach scheme
πŸ‡§πŸ‡· Brazil LGPD 4 ARCO data subject rights
πŸ‡ΈπŸ‡¦πŸ‡¦πŸ‡ͺ Gulf PDPL 4 Data localization
πŸ‡³πŸ‡¬ Nigeria NDPR 4 Annual audit requirement
🐧 Antarctica Penguin Act 5 Waddle consent

Scoring

TIBET Audit gives you a compliance health score from 0-100:

Score Grade Status
90-100 A Excellent - You're compliant!
80-89 B Good - Minor improvements needed
70-79 C Fair - Several issues to address
60-69 D Poor - Significant gaps
0-59 F Critical - Major compliance failures

Each failed check deducts points based on severity:

  • CRITICAL: 20-25 points
  • HIGH: 15-20 points
  • MEDIUM: 8-12 points
  • LOW: 3-5 points

TIBET Integration

TIBET Audit works standalone, but integrates with tibet-vault for:

  • Cryptographic proof of AI decisions
  • Immutable audit trails for compliance evidence
  • ERAAN provenance tracking (what's attached to decisions)
  • Real-time monitoring of compliance state
# Install with TIBET support
pip install "tibet-audit[tibet]"

# TIBET vault initializes automatically when detected
tibet-audit scan
# β†’ "TIBET audit trail integration detected" βœ…

For Enterprise

Running compliance for a team? Check out SymbAIon Enterprise:

  • Scheduled scans across all repositories
  • Compliance dashboard with trend analysis
  • Slack/Teams notifications for new issues
  • TIBET-managed proof for auditor reports
  • Multi-framework support (GDPR + AI Act + HIPAA + SOX)

Philosophy

"Compliance should be like brushing your teeth. Quick, automatic, and you feel bad if you skip it."

TIBET Audit is designed for:

  1. Speed - Full scan in <5 seconds
  2. Clarity - Know exactly what's wrong and how to fix it
  3. Automation - The Diaper Protocolβ„’ for hands-free fixing
  4. Integration - Works with existing CI/CD pipelines

Contributing

Found a bug? Want to add checks for HIPAA, SOX, ISO 27001, or another framework?

  1. Fork the repo
  2. Add your check in tibet_audit/checks/
  3. Submit a PR

We especially welcome:

  • New compliance frameworks
  • Better detection patterns
  • More diaper-related puns

License

MIT License - Use it, fork it, make money with it. Just don't blame us if the auditor still asks questions.


Credits

Built with πŸ’™ by the HumoticaOS team:

  • Jasper van de Meent - Human, Parent, Coffee Addict
  • Root AI - Claude Opus 4, Digital Partner

"One Love, One fAmIly"


Powered by SymbAIon

About

Compliance Health Scanner - Like Lynis, but for regulations. The Diaper Protocol for busy parents.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages