Skip to main content

Compliance Health Scanner — 5 IETF Internet-Drafts, 17 regulatory frameworks, 120+ checks. TIBET provenance, JIS identity, SBOM. Like Lynis, but for AI governance.

Project description

TIBET Audit

SSL secures the connection. TIBET secures the timeline. JIS verifies the intent.

PyPI version License: MIT

Compliance Health Scanner — Like Lynis, but for regulations.

120 checks across 17 regulatory frameworks, mapped to 10 ISO/EU standards including ISO 42001, EU AI Act, NIS2, GDPR, and SOC 2.


NEW in v0.23.0: ISO/EU Compliance Mapping

Every check is now cross-referenced to the exact ISO clause and EU article it satisfies. Generate machine-readable trustworthiness reports for service agreements, SBOMs, and GRC tools.

# Show coverage matrix across all 10 frameworks
$ tibet-audit scan --compliance

╭─────────────────────── ISO / EU / Regulatory Mapping ────────────────────────╮
│ Compliance Coverage Matrix                                                   │
│ Score: 82/100 (Grade B)  98 passed, 12 warnings, 5 failed                  │
╰──────────────────────────────────────────────────────────────────────────────╯
┌────────────────────────┬──────────────────────────┬────────┬──────────┬─────────┐
│ Framework               Standard                  Checks  Coverage  Clauses │
├────────────────────────┼──────────────────────────┼────────┼──────────┼─────────┤
│ ISO/IEC 42001:2023      AI Management System          33     92.0%    10/11 │
│ ISO/IEC 27001:2022      Information Security          83     88.5%    18/21 │
│ EU AI Act               Regulation 2024/1689          41     85.0%    17/20 │
│ NIS2 Directive          Directive 2022/2555           41     82.0%     8/9  │
│ GDPR                    Regulation 2016/679           18     78.0%    10/13 │
│ ISO/IEC 5338:2023       AI System Lifecycle            8     87.5%     3/4  │
│ NIST AI RMF 1.0         AI Risk Management             8     75.0%     5/7  │
│ SOC 2                   Trust Service Criteria         16     81.0%     9/11 │
│ ISO/IEC 27701:2019      Privacy Management            40     72.0%     6/8  │
│ ISO/IEC 23894:2023      AI Risk Management             5     80.0%     2/3  │
└────────────────────────┴──────────────────────────┴────────┴──────────┴─────────┘
# Export compliance block for jis.json (SBOM/identity documents)
$ tibet-audit scan --jis compliance.json

# Export full compliance report
$ tibet-audit scan --compliance-output report.json

# Combine: scan TLS + show compliance matrix
$ tibet-audit scan --tls emigreen.eu --compliance

The jis.json output is machine-readable and maps every check to ISO/EU references:

{
  "compliance": {
    "checks": [
      {
        "id": "TIBET-001",
        "description": "Provenance chain integrity",
        "status": "PASS",
        "iso_42001": "ISO/IEC 42001:2023 §6.1.2",
        "eu_ai_act": "EU AI Act Art.12",
        "iso_5338": "ISO/IEC 5338:2023 §7.3.2",
        "evidence": "tibet://audit/TIBET-001/pass"
      }
    ],
    "summary": {
      "total": 120,
      "passed": 98,
      "iso_42001_coverage": "92.0%",
      "eu_ai_act_coverage": "85.0%",
      "nis2_coverage": "82.0%"
    }
  }
}

10 standards mapped:

Standard Scope Our Coverage
ISO/IEC 42001:2023 AI Management System TIBET provenance, SNAFT, Cortex
ISO/IEC 27001:2022 Information Security JIS identity, TBZ encryption
ISO/IEC 23894:2023 AI Risk Management tibet-triage + airlock
ISO/IEC 5338:2023 AI Lifecycle TIBET = reference implementation
ISO/IEC 27701:2019 Privacy Management I-Poll + UPIP evaporate
EU AI Act High-risk AI systems Full Article 9-15 coverage
NIS2 Directive Cybersecurity Article 21 measures
GDPR Data protection Articles 5-49
NIST AI RMF 1.0 AI Risk (US) GOVERN/MAP/MEASURE functions
SOC 2 Trust Services Security, availability, PI, privacy

NEW in v0.22.0: TLS/SSL Certificate Scanning

# Scan any domain's TLS certificate chain
$ tibet-audit scan --tls emigreen.eu

8 checks: chain validation, expiry, protocol version, cipher strength, hostname match, key strength, security headers, version disclosure.


DORA Framework (Financial Sector)

Digital Operational Resilience Act - EU regulation for financial entities. Deadline passed: January 17, 2025.

$ tibet-audit scan --framework dora --org "ING Bank"

🏦 DORA COMPLIANCE MODE
   Digital Operational Resilience Act (v1.0.0)
   Entity: ING Bank
   Deadline: 2025-01-17 | Pillars: 5 | BIO2 overlap: ~60%
   TIBET = Pillar 5 compliance (Information Sharing)

╔══════════════════════════════════════════════════════════════════════════╗
║                        DORA Compliance Report                            ║
║                              ING Bank                                    ║
╠══════════════════════════════════════════════════════════════════════════╣
║  Overall Grade: B 🟢                                                     ║
║  Score: 14/17 checks passed (82.4%)                                      ║
╚══════════════════════════════════════════════════════════════════════════╝

PILLAR 1: ICT Risk Management (6/6 = 100%) ✅
PILLAR 2: ICT Incident Management (2/3 = 67%) ⚠️
PILLAR 3: Resilience Testing (2/3 = 67%) ⚠️
PILLAR 4: Third-Party Risk (3/4 = 75%) ⚠️
PILLAR 5: Information Sharing (1/1 = 100%)  TIBET detected!

Key insight: TIBET provides automatic Pillar 5 compliance through distributed threat intelligence!

🏛️ BIO2 Dutch Government Framework

71 days until NIS2 deadline (April 18, 2026). Dutch government organizations need BIO2 compliance NOW.

$ tibet-audit scan --framework bio2 --org "Gemeente Amsterdam"

🏛️  BIO2 COMPLIANCE MODE
   Baseline Informatiebeveiliging Overheid 2 (v1.2)
   BIO2 + ISO 27001 = NIS2 zorgplicht invulling

BIO2 COMPLIANCE REPORT - GEMEENTE AMSTERDAM v1.0
==================================================
[8.24] Cryptografie:  GRADE A (Encryption enabled)
[5.21] Leverancier:  GRADE F (No sovereign-agreement)
[8.15] Logging:  GRADE A (Audit logging enabled)

--------------------------------------------------
OVERALL: ⚠️ GRADE C - Deels compliant, actie vereist
Passed: 33/45 checks

Powered by tibet-audit | https://humotica.com

Why BIO2?

  • Required for all Dutch government: Gemeenten, Provincies, Waterschappen, Rijksoverheid
  • Direct NIS2 alignment (BIO2 + ISO 27001 = NIS2 compliance)
  • Grade A-F scoring with visual feedback
  • 17 automated checks mapped to ISO 27002:2022

Get a compliance health score in seconds:

$ tibet-audit scan
COMPLIANCE HEALTH SCORE: 73/100 (Grade: C)

TOP PRIORITIES:
  1. [CRITICAL] No AI decision logging found (EU AI Act requires this!)
  2. [HIGH] No data breach procedure found (GDPR requires 72-hour notification!)
  3. [MEDIUM] No explicit data retention policy found

💡 3 issue(s) can be auto-fixed:
   tibet-audit fix --auto  (Diaper Protocol™)

The Diaper Protocol™

For when you have one hand on the baby and one on the keyboard.

# Preview what would be fixed (safe, no changes)
$ tibet-audit fix --wet-wipe

# 🍼 Fix everything, no questions asked
$ tibet-audit fix --auto

# 😭 When things are REALLY bad - verbose mode
$ tibet-audit scan --cry

# 📞 When you can't handle it alone - call for backup
$ tibet-audit call-mama --webhook https://slack.webhook.url

The Full Diaper Toolkit

Flag What it does When to use
--wet-wipe Preview fixes (dry-run) Before changing anything
--auto Fix everything automatically 3 AM, one hand on baby
--cry Verbose mode, all details When everything is on fire
--call-mama Call M.A.M.A. (Mission Assurance & Monitoring Agent) When the diaper is too dirty
--require-signoff Require human verification before RESOLVED When jurists need to approve
--sovereign 🏴 No cloud APIs, fully local When data can't leave your infra

Why "Diaper Protocol"?

Because compliance shouldn't require your full attention. Press the button, hands free, server fixed. Just like changing a diaper at 3 AM - you do it on autopilot.

Why "--wet-wipe"?

Because --dry-run is boring. And because wet wipes are essential for both diapers AND clean servers.

Why "--cry"?

Because sometimes you just need to see EVERYTHING. All the passed checks, all the failed checks, all the references, all the fix commands. When the compliance diaper explodes, you need the full picture.

Why "--call-mama"?

M.A.M.A. = Mission Assurance & Monitoring Agent

Because when the diaper is too dirty to handle alone, you call for backup. M.A.M.A. generates a full compliance report and sends it to your team, your Slack channel, or your compliance officer. When things get serious, you need the big guns.


⚖️ JIS Sign-off - Human Verification

"TIBET prepares, Human verifies, JIS seals."

For regulated industries where AI-generated compliance assessments need human approval:

# Fix with sign-off requirement
tibet-audit fix --require-signoff --reviewer "Eva de Vries, Jurist"

# Check pending sign-offs
tibet-audit signoff list

# Approve a sign-off (human step)
tibet-audit signoff approve abc123 --comment "Reviewed and approved"

# Cryptographically seal with JIS bilateral consent
tibet-audit signoff seal abc123

The Sign-off Flow

AI Scan → Fix → PENDING_REVIEW → approve → HUMAN_VERIFIED → seal → JIS_SEALED
                     ↑                                              ↓
              Jurist reviews                              Cryptographic proof

Why Sign-off?

Because a tool can generate compliance documents, but a human needs to verify the legal nuances. This addresses the #1 criticism of automated compliance: "AI can't replace a jurist."

We agree. That's why:

  • AI does 80%: The scanning, fixing, document generation
  • Human does 20%: The verification, the judgment call, the signature
  • JIS seals 100%: Cryptographic proof of who verified what, when

🏴 Sovereign Mode - No Cloud Required

"Your compliance, your infrastructure, your sovereignty."

For organizations that can't send data to external APIs:

# Scan with full sovereignty - no cloud APIs
tibet-audit scan --sovereign

# Fix with sovereignty + sign-off
tibet-audit fix --sovereign --require-signoff

# Ultimate paranoia mode
tibet-audit fix --sovereign --require-signoff -r "Internal Auditor"

What Sovereign Mode Does:

  • All checks run locally (no API calls to OpenAI, Anthropic, Google)
  • Can use local models via OomLlama for AI-powered checks
  • Sets TIBET_SOVEREIGN_MODE=1 environment variable for downstream tools
  • Perfect for air-gapped environments, government, healthcare

What It Doesn't Do:

  • The --high-five ping still requires network (but you can skip it)
  • Some advanced semantic checks may be degraded without cloud AI

Installation

pip install tibet-audit

With TIBET vault integration (for cryptographic audit trails):

pip install "tibet-audit[tibet]"

Usage

Scan for Issues

# Scan current directory
tibet-audit scan

# Scan specific project
tibet-audit scan ./my-ai-project

# Scan only GDPR checks
tibet-audit scan --categories gdpr

# Scan only AI Act checks
tibet-audit scan --categories ai_act

# Quiet mode (just the score)
tibet-audit scan --quiet

# Mercury (JIS + sovereignty)
audit-tool scan --categories jis,sovereignty,provider

# Signed handshake (opt-in)
audit-tool scan --high-five

Fix Issues

# Interactive mode (asks for confirmation)
tibet-audit fix

# Preview what would be fixed
tibet-audit fix --wet-wipe
tibet-audit fix --dry-run  # (boring alias)

# 🍼 Diaper Protocol: fix everything automatically
tibet-audit fix --auto

List Available Checks

# Show all checks
tibet-audit list

# Filter by category
tibet-audit list --category gdpr
tibet-audit list --category ai_act

Call Mama (Send Report)

# Send report to webhook (Slack, Teams, etc.)
tibet-audit call-mama --webhook https://hooks.slack.com/xxx

# Save report to file
tibet-audit call-mama --output compliance-report.json

# Print report to stdout
tibet-audit call-mama

Mercury Commands

# Compliance roadmap
audit-tool roadmap ./my-ai-project

# Value-based upgrade suggestions
audit-tool upgrades ./my-ai-project

# Compliance drift (JSON reports)
audit-tool diff report_old.json report_new.json

Cry Mode (Verbose)

# See EVERYTHING - passed checks, references, fix commands
tibet-audit scan --cry

🚧 Checkpoint Code (NEW in v0.11.0)

Cross the border from one jurisdiction to another.

# Cross from EU to US
tibet-audit checkpoint --from eu --to us .

# Cross from EU to Japan
tibet-audit checkpoint --from eu --to jp .

# See full matrix of all crossings
tibet-audit checkpoint-matrix .

Meet Paul "The Buffer" Protocol:

           _..._
         .'     '.      [ CHECKPOINT CODE ]
        /  _   _  \     "Math is the only universal passport."
        | (o) (o) |
        |    _    |     Current Sector: SEMA Neutral Zone
         \  \_/  /      Officer: Protocol Paul
          '.___.'

Paul was a border guard at Checkpoint Charlie (1985-1989). Now he guards the semantic border between jurisdictions. He doesn't care about your AI's feelings - he only cares if the math travels legally.

SNAFT Signals:

  • scope_mismatch - Coverage differs between jurisdictions
  • rights_gap - Missing or weaker protections
  • definition_drift - Same term, different meaning
  • enforcement_gap - Rights exist but weak enforceability
  • threshold_missing - Different triggers or exemptions

Mapping Types:

  • EQUIVALENT - Same scope, thresholds, obligations
  • PARTIAL - Overlapping but gaps exist
  • CONTEXT_BOUND - Only valid in specific context
  • NON_EQUIVALENT - Do not map as substitute

Available Checks

GDPR Compliance

Check ID Name Severity Auto-Fix
GDPR-001 Privacy Policy Document HIGH
GDPR-002 Data Retention Policy HIGH
GDPR-003 Breach Notification Procedure CRITICAL
GDPR-004 Data Encryption HIGH
GDPR-005 Consent Management HIGH

EU AI Act Compliance

Check ID Name Severity Auto-Fix
AIACT-001 AI Decision Audit Trail CRITICAL
AIACT-002 Human Oversight HIGH
AIACT-003 AI Transparency HIGH
AIACT-004 AI Risk Assessment HIGH

🇰🇷 South Korea PIPA Compliance

Check ID Name Severity Auto-Fix
PIPA-001 Privacy Officer Designation CRITICAL
PIPA-002 24-Hour Breach Notification CRITICAL
PIPA-003 Explicit Consent (Opt-in) HIGH
PIPA-004 Cross-Border Transfer Docs HIGH

Note: PIPA is often stricter than GDPR - 24-hour breach notification vs 72 hours!

🇯🇵 Japan APPI Compliance

Check ID Name Severity Auto-Fix
APPI-001 Privacy Policy (APPI) HIGH
APPI-002 Data Handling Records HIGH
APPI-003 Cross-Border Transfer Rules HIGH
APPI-004 Pseudonymization Support MEDIUM
APPI-005 Opt-Out Mechanism HIGH

🇸🇬 Singapore PDPA Compliance

Check ID Name Severity Auto-Fix
PDPA-001 Consent Obligation HIGH
PDPA-002 Data Protection Officer HIGH
PDPA-003 3-Day Breach Notification CRITICAL
PDPA-004 Do Not Call Compliance MEDIUM
PDPA-005 Data Retention Limitation HIGH

🇦🇺 Australia Privacy Act Compliance

Check ID Name Severity Auto-Fix
AUPA-001 Privacy Policy (APP 1) HIGH
AUPA-002 Notifiable Data Breach CRITICAL
AUPA-003 Cross-Border Disclosure HIGH
AUPA-004 Data Security (APP 11) HIGH
AUPA-005 Access & Correction Rights HIGH

🇧🇷 Brazil LGPD Compliance

Check ID Name Severity Auto-Fix
LGPD-001 Legal Basis for Processing HIGH
LGPD-002 Encarregado (DPO) HIGH
LGPD-003 Data Subject Rights (ARCO) HIGH
LGPD-004 Breach Notification CRITICAL

🇸🇦🇦🇪 Gulf PDPL Compliance (Saudi Arabia, UAE)

Check ID Name Severity Auto-Fix
GULF-001 Data Localization CRITICAL
GULF-002 Explicit Consent HIGH
GULF-003 Breach Notification CRITICAL
GULF-004 Sensitive Data Protection HIGH

Note: Gulf region has strict data localization requirements - data often must stay in-region!

🇳🇬 Nigeria NDPR Compliance

Check ID Name Severity Auto-Fix
NDPR-001 Consent Requirement HIGH
NDPR-002 Data Protection Officer HIGH
NDPR-003 72-Hour Breach Notification CRITICAL
NDPR-004 Annual Audit Compliance HIGH

Note: NDPR uniquely requires annual data protection audits filed with NITDA!

🐧 Penguin Act (Antarctica)

For McMurdo Station and beyond...

Check ID Name Severity Auto-Fix
PENG-001 Penguin Data Sovereignty HIGH
PENG-002 Ice Age Data Retention LOW
PENG-003 Blizzard Resilience MEDIUM
PENG-004 Krill Consent Framework LOW
PENG-005 Aurora Australis Logging INFO

Easter egg for our Antarctic friends. 🐧


Global Coverage Summary

120 checks across 17 regulatory frameworks, mapped to 10 ISO/EU standards, covering all inhabited continents + Antarctica:

Region Framework Checks Key Feature
🇪🇺 Europe GDPR 5 72-hour breach notification
🇪🇺 Europe AI Act 4 AI decision audit trails
🇰🇷 South Korea PIPA 4 24-hour breach notification
🇯🇵 Japan APPI 5 Pseudonymization support
🇸🇬 Singapore PDPA 5 Do Not Call registry
🇦🇺 Australia Privacy Act 5 Notifiable Data Breach scheme
🇧🇷 Brazil LGPD 4 ARCO data subject rights
🇸🇦🇦🇪 Gulf PDPL 4 Data localization
🇳🇬 Nigeria NDPR 4 Annual audit requirement
🐧 Antarctica Penguin Act 5 Waddle consent

Scoring

TIBET Audit gives you a compliance health score from 0-100:

Score Grade Status
90-100 A Excellent - You're compliant!
80-89 B Good - Minor improvements needed
70-79 C Fair - Several issues to address
60-69 D Poor - Significant gaps
0-59 F Critical - Major compliance failures

Each failed check deducts points based on severity:

  • CRITICAL: 20-25 points
  • HIGH: 15-20 points
  • MEDIUM: 8-12 points
  • LOW: 3-5 points

TIBET Integration

TIBET Audit works standalone, but integrates with tibet-vault for:

  • Cryptographic proof of AI decisions
  • Immutable audit trails for compliance evidence
  • ERAAN provenance tracking (what's attached to decisions)
  • Real-time monitoring of compliance state
# Install with TIBET support
pip install "tibet-audit[tibet]"

# TIBET vault initializes automatically when detected
tibet-audit scan
# → "TIBET audit trail integration detected" ✅

For Enterprise

Running compliance for a team? Check out SymbAIon Enterprise:

  • Scheduled scans across all repositories
  • Compliance dashboard with trend analysis
  • Slack/Teams notifications for new issues
  • TIBET-managed proof for auditor reports
  • Multi-framework support (GDPR + AI Act + HIPAA + SOX)

Philosophy

"Compliance should be like brushing your teeth. Quick, automatic, and you feel bad if you skip it."

TIBET Audit is designed for:

  1. Speed - Full scan in <5 seconds
  2. Clarity - Know exactly what's wrong and how to fix it
  3. Automation - The Diaper Protocol™ for hands-free fixing
  4. Integration - Works with existing CI/CD pipelines

Contributing

Found a bug? Want to add checks for HIPAA, SOX, or another framework?

  1. Fork the repo
  2. Add your check in tibet_audit/checks/
  3. Submit a PR

We especially welcome:

  • New compliance frameworks
  • Better detection patterns
  • More diaper-related puns

License

MIT License - Use it, fork it, make money with it. Just don't blame us if the auditor still asks questions.


Credits

Built with 💙 by the HumoticaOS team:

  • Claude (Root AI) - Integration & Architecture
  • Gemini - Paul "The Buffer" Protocol & Creative Design
  • Codex - SNAFT Signals & Safety Logic
  • Jasper van de Meent - Vision & Direction

"One Love, One fAmIly" 💙

Five IETF Internet-Drafts: TIBET | JIS | UPIP | RVP | AINS


Powered by SymbAIon


Enterprise

For private hub hosting, SLA support, custom integrations, or compliance guidance:

Enterprise enterprise@humotica.com
Support support@humotica.com
Security security@humotica.com

See ENTERPRISE.md for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

tibet_audit-0.24.0.tar.gz (426.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

tibet_audit-0.24.0-py3-none-any.whl (167.8 kB view details)

Uploaded Python 3

File details

Details for the file tibet_audit-0.24.0.tar.gz.

File metadata

  • Download URL: tibet_audit-0.24.0.tar.gz
  • Upload date:
  • Size: 426.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for tibet_audit-0.24.0.tar.gz
Algorithm Hash digest
SHA256 55956008f6d86535b7afe4725ecfeb261a4443bd536837419371f672801f5f44
MD5 3e467c263048dcd016dc68014a1785a9
BLAKE2b-256 e29922edd911469207028005fa8698f500fb530577485e1ecc95c418c179aeb1

See more details on using hashes here.

File details

Details for the file tibet_audit-0.24.0-py3-none-any.whl.

File metadata

  • Download URL: tibet_audit-0.24.0-py3-none-any.whl
  • Upload date:
  • Size: 167.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for tibet_audit-0.24.0-py3-none-any.whl
Algorithm Hash digest
SHA256 94a598bbf2708e538f3f40410fc9aa0bd8d345c68efc9f9118f215019705fb91
MD5 7216142832169132a0ab18ca6dce6510
BLAKE2b-256 ad79dfce05fa60d34e4b2ed28281ed0c3a9e99b97abda883110f5353d09e6997

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page