Execute use when you need to work with compliance checking. This skill provides compliance monitoring and validation with comprehensive guidance and automation. Trigger with phrases like "check compliance", "validate policies", or "audit compliance".
48
37%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./plugins/devops/compliance-checker/skills/checking-infrastructure-compliance/SKILL.mdAudit infrastructure configurations against compliance frameworks (CIS Benchmarks, SOC 2, HIPAA, PCI-DSS, GDPR) using policy-as-code tools like Open Policy Agent (OPA), Checkov, and tfsec. Generate compliance reports, identify violations, and produce remediation plans for Terraform, Kubernetes, and cloud provider configurations.
checkov, tfsec, opa, or kube-benchjq for parsing JSON policy outputscheckov -d . or tfsec . to detect misconfigurationsaws iam access-analyzer)| Error | Cause | Solution |
|---|---|---|
checkov: no Terraform files found | Scanner run from wrong directory | Specify path explicitly with -d path/to/terraform/ |
tfsec: failed to parse HCL | Syntax error in Terraform files | Run terraform validate first to fix HCL syntax before compliance scan |
False positive on compliance check | Rule too broad for the specific use case | Add inline skip comments (#checkov:skip=CKV_AWS_18:Reason) or create a .checkov.yml skip list |
OPA policy evaluation error | Rego syntax error or missing input data | Test policies with opa eval -d policy.rego -i input.json and validate Rego syntax |
Scan timeout on large codebase | Too many files or complex module references | Use --compact mode, scan directories individually, or increase timeout limits |
3a2d27d
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.