Skip to main content

Category A: Code (9 strategies)

IDStrategyWhat it doesScore impact
A1SDK WrapperAdds @complior/sdk proxy wrapper around LLM client+5–8
A2Disclosure InjectAdds “I am an AI” system message (Art.50)+3–5
A3Input ValidationAdds request validation and sanitization+2–3
A4Error HandlingAdds try/catch with compliance-aware error responses+1–2
A5LoggingAdds structured logging for audit trail (Art.12)+2–3
A6Permission GuardAdds tool allowlist/denylist enforcement+2–3
A7HITL GateAdds human-in-the-loop approval gate (Art.14)+3–5
A8Config HardeningHardens configuration files+1–2
A9Unsafe DeserializationReplaces pickle with safetensors/JSON+1–2

Category B: Documents (6 strategies)

IDDocumentArticlePre-fill from passport
B1FRIA (Fundamental Rights Impact Assessment)Art.2780%
B2AI Usage PolicyArt.6, Annex III60%
B3Risk Management PlanArt.940%
B4Technical DocumentationArt.1150%
B5Worker NotificationArt.26(7)70%
B6Transparency NoteArt.5060%
The more complete your Agent Passport, the more data flows into documents automatically. Passports are auto-created during complior init — fill manual fields (Stage 3) before running complior fix for best results.

Category C: Config (3 strategies)

IDStrategyWhat it does
C1Secret RotationDetects exposed secrets, suggests rotation
C2Gitignore HardeningAdds AI keys, model files, .complior/keys/ to .gitignore
C3Docker SecurityAdds non-root user, read-only filesystem

Category D: Dependencies (3 strategies)

IDStrategyWhat it does
D1CVE UpgradeSuggests updates for vulnerable dependencies
D2License CheckFlags incompatible licenses in AI dependencies
D3Model FormatRecommends safetensors over pickle for model files

Category E: Passport (3 strategies)

IDStrategyWhat it does
E1Risk Level UpdateRecalculates risk class from latest scan data
E2Compliance FieldsUpdates obligation met/pending lists
E3Evidence ChainRecords fix in cryptographic evidence chain