Gdpr

Audit GDPR compliance, generate privacy policies, and document data flows. Use when auditing practices, drafting policies, or checking consent flows.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "Gdpr" with this command: npx skills add bytesagain3/gdpr

GDPR

GDPR v2.0.0 — a security toolkit for managing GDPR compliance workflows from the command line. Log security operations, audit trails, policy changes, and more. Each entry is timestamped and persisted locally. Works entirely offline — your data never leaves your machine.

Commands

Domain Commands

Each domain command works in two modes: log mode (with arguments) saves a timestamped entry, view mode (no arguments) shows the 20 most recent entries.

CommandDescription
gdpr generate <input>Log a generation event (privacy policy, consent form, etc.)
gdpr check-strength <input>Log a strength check result (password, encryption, etc.)
gdpr rotate <input>Log a key/credential rotation event
gdpr audit <input>Log an audit finding or compliance check result
gdpr store <input>Log a data storage event (what was stored and where)
gdpr retrieve <input>Log a data retrieval/access event
gdpr expire <input>Log a data expiration or retention event
gdpr policy <input>Log a policy change or update
gdpr report <input>Log a report entry or compliance summary
gdpr hash <input>Log a hashing operation (data anonymization, etc.)
gdpr verify <input>Log a verification result (identity, consent, integrity)
gdpr revoke <input>Log a revocation event (consent withdrawal, access removal)

Utility Commands

CommandDescription
gdpr statsShow summary statistics across all log files
gdpr export <fmt>Export all data to a file (formats: json, csv, txt)
gdpr search <term>Search all log entries for a term (case-insensitive)
gdpr recentShow the 20 most recent entries from the activity log
gdpr statusHealth check — version, data dir, entry count, disk usage
gdpr helpShow the built-in help message
gdpr versionPrint the current version (v2.0.0)

Data Storage

All data is stored locally at ~/.local/share/gdpr/. Each domain command writes to its own log file (e.g., audit.log, policy.log, revoke.log). A unified history.log tracks all actions across commands. Use export to back up your data at any time.

Requirements

  • Bash (4.0+)
  • No external dependencies — pure shell script
  • No network access required

When to Use

  • Auditing GDPR compliance across your organization's data practices
  • Logging data access and retrieval events for accountability
  • Tracking consent revocations and data subject requests
  • Recording key/credential rotation schedules
  • Documenting policy changes with timestamps for audit trails
  • Managing data retention and expiration workflows
  • Generating compliance reports from logged activity
  • Exporting audit logs for regulatory submissions

Examples

# Log a compliance audit finding
gdpr audit "User data export endpoint missing encryption — needs fix"

# Record a policy update
gdpr policy "Updated cookie consent banner to include analytics opt-out"

# Log a consent revocation
gdpr revoke "User #4521 withdrew marketing consent via email"

# Track a key rotation
gdpr rotate "API key rotated for payment service, old key expires 2025-04-01"

# Log data storage event
gdpr store "Backup of EU customer PII moved to Frankfurt region"

# Verify identity check
gdpr verify "KYC verification passed for account #8832"

# Log a data expiration
gdpr expire "Inactive accounts older than 2 years purged per retention policy"

# Generate a hash record
gdpr hash "SHA-256 hash of user export file: a3f8c9..."

# Search across all logs
gdpr search "consent"

# Export everything as CSV
gdpr export csv

# Check overall status
gdpr status

# View recent activity
gdpr recent

Powered by BytesAgain | bytesagain.com | hello@bytesagain.com

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Privacy Mask

Mask, redact, anonymize and censor sensitive information (PII) in screenshots and images — phone numbers, emails, IDs, API keys, crypto wallets, credit cards...

Registry SourceRecently Updated
4351Profile unavailable
Security

JEP Guard

JEP Guard intercepts high-risk commands, requires user confirmation, issues temporary tokens, and logs actions with exportable audit receipts.

Registry SourceRecently Updated
4791Profile unavailable
Security

Data Privacy & Protection Program

Create and audit comprehensive data privacy programs covering GDPR, CCPA/CPRA, LGPD, POPIA, PIPL—from data mapping to breach response and consent management.

Registry Source
8600Profile unavailable
General

Privacy Policy Generator

Generate a comprehensive, legally compliant privacy policy in Markdown covering GDPR, CCPA, and APPI based on your business details and data practices.

Registry SourceRecently Updated
410Profile unavailable