compliance-policy-check

Compliance Policy Check

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "compliance-policy-check" with this command: npx skills add oimiragieo/agent-studio/oimiragieo-agent-studio-compliance-policy-check

Compliance Policy Check

Overview

Evaluate a design/plan against framework policy and rule constraints before execution. Use this for regulated or high-risk changes.

When to Use

  • Before creator workflows for new artifacts

  • Before HIGH/EPIC implementation phases

  • During reflection when repeated policy violations are observed

Iron Laws

  • NEVER execute or modify code during compliance checks — this skill assesses policy alignment only; any implementation must happen separately after compliance is confirmed.

  • ALWAYS run compliance check before HIGH/EPIC implementation — high-risk changes that bypass compliance checks create undetected policy drift that compounds over time into systemic violations.

  • ALWAYS report findings with specific remediation tasks and owning agent — vague "policy violation" reports without actionable remediation steps don't produce fixes; every FAIL and CONDITIONAL must include a concrete task.

  • NEVER report PASS on partial compliance — a plan that satisfies 80% of policies is a CONDITIONAL, not a PASS; partial compliance masks the remaining violations and gives false confidence.

  • ALWAYS recheck after remediation, not just once — a single compliance check before implementation is insufficient; verify again after major changes to confirm remediations are complete.

Workflow

Step 1: Gather Policy Context

  • Read relevant files in .claude/rules/

  • Read applicable workflow/agent constraints

  • Read enforcement hook docs if needed

Step 2: Evaluate Proposed Change

Assess against:

  • Creator guard and artifact lifecycle rules

  • Routing and specialist-first requirements

  • Security and quality gate requirements

  • Memory/search/token-saver policy expectations

Step 3: Produce Decision

Return one policy decision:

  • PASS : policy-aligned

  • CONDITIONAL : allowed with required mitigations

  • FAIL : not policy-compliant

Use this output shape:

{ "decision": "PASS|CONDITIONAL|FAIL", "policyFindings": ["..."], "requiredMitigations": [], "evidencePaths": ["..."], "recommendedNextStep": "..." }

Output Protocol

For CONDITIONAL and FAIL , include precise remediation tasks and ownership (agent type).

Anti-Patterns

Anti-Pattern Why It Fails Correct Approach

Implementing code during compliance check Conflates assessment with implementation Assess only; implementation happens separately after PASS

Skipping compliance for "small" changes Small changes introduce policy violations silently Run compliance check proportionally for all HIGH/EPIC work

Reporting PASS on partial compliance Masks unresolved violations; gives false confidence Report CONDITIONAL with specific remediation required

Vague violation reports without remediation Violations aren't fixed without clear next steps Include agent, task, and target file for every FAIL/CONDITIONAL

Only checking once before implementation Post-change compliance drift goes undetected Recheck compliance after major implementation changes

Memory Protocol

Record recurring policy drift patterns in .claude/context/memory/issues.md and stabilized controls in .claude/context/memory/decisions.md .

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Automation

filesystem

No summary provided by upstream source.

Repository SourceNeeds Review
Automation

slack-notifications

No summary provided by upstream source.

Repository SourceNeeds Review
Automation

chrome-browser

No summary provided by upstream source.

Repository SourceNeeds Review
Automation

diagram-generator

No summary provided by upstream source.

Repository SourceNeeds Review