complior-cli 1.0.0

AI Act Compliance Scanner & Fixer — CLI
complior-cli-1.0.0 is not a library.

Complior

Daemon-Orchestrator for AI Compliance

Background compliance daemon for AI applications. Compliance gate on every file change.


[!IMPORTANT] Status: v8 Architecture

Complior v8 is a daemon-orchestrator: background daemon (file watcher + engine + MCP server + HTTP API) + Rust TUI dashboard + CLI commands. The v1 engine (scanner, fixer, 2500+ tests) works. Agents connect independently via MCP. Contributions and feedback are welcome.


What is Complior?

Complior is a background compliance daemon that monitors your AI project for EU AI Act compliance. It watches every file change and rescans in ~200ms. Agents (Claude Code, Cursor, VS Code, OpenCode, aider) work independently and connect via MCP.

The problem: Developers write AI code without compliance. Lawyers check compliance without code. No tool bridges this gap. EU AI Act enforcement: August 2, 2026 (~4 months).

The solution: A daemon that monitors file changes and provides real-time compliance feedback. Agents work independently — Complior doesn't manage their processes.

$ complior                     # daemon + TUI dashboard (default)
$ complior daemon --watch      # headless daemon (CI/CD, server)
$ complior scan --ci           # standalone CLI (one-shot scan)

How It Works

┌─────────────────────────────────────────────────────────────────┐
│                       COMPLIOR v8 SYSTEM                        │
│                                                                 │
│  ┌──────────────────────────────────────────────────────────┐  │
│  │  DAEMON (background process)                             │  │
│  │                                                          │  │
│  │  File Watcher    TS Engine (Hono)    MCP Server          │  │
│  │  (chokidar)      Scanner, Fixer     (stdio, 8 tools)    │  │
│  │  inotify →       Passport, Gate                          │  │
│  │  rescan →        Reporter, Evidence  HTTP API             │  │
│  │  SSE notify      5-layer scanner     (localhost:PORT)    │  │
│  └──────────────────────────────────────────────────────────┘  │
│       ▲ HTTP/SSE          ▲ MCP (stdio)         ▲ HTTP        │
│       │                   │                     │             │
│  ┌────┴───────┐   ┌──────┴──────────┐   ┌─────┴──────┐     │
│  │ TUI        │   │ Coding Agents    │   │ CLI        │     │
│  │ (Rust,     │   │ (Claude Code,    │   │ (standalone │     │
│  │  ratatui)  │   │  Cursor, VS Code,│   │  commands)  │     │
│  │ 7 pages    │   │  OpenCode, aider)│   │             │     │
│  │ 100+ themes│   │ Work             │   │ scan, fix,  │     │
│  └────────────┘   │ INDEPENDENTLY    │   │ report, ... │     │
│                   └──────────────────┘   └────────────┘     │
└─────────────────────────────────────────────────────────────────┘
  1. Agents write code independently (Claude Code, Cursor, VS Code, etc.)
  2. Complior daemon watches every file change via inotify/FSEvents
  3. Background rescan in ~200ms → score updates in real time
  4. If score drops → SSE notification with exact article + auto-fix option

No other tool does this.

Key Features

  • Daemon Architecture — background process, agents connect via MCP independently
  • Real-time Compliance Gate — every file change → rescan in 200ms → score update
  • 5-Layer Scanner — file presence → document structure → config/deps → AST patterns → LLM deep analysis
  • 45 Banned Packages — covers all 8 Art. 5 prohibitions
  • 33 Pattern Rules — across 8 categories + 5 cross-layer verification rules
  • 6+ Auto-Fixers — disclosure, marking, logging, docs, metadata, FRIA
  • Agent Passport — central entity (36 fields, ed25519 signed, 3 creation modes)
  • 7-Step Pipeline — Discover → Classify → Scan → Fix → Document → Monitor → Certify
  • 8 MCP Tools — compliance tools for Claude Code, Cursor, Windsurf, any MCP client
  • 5,011+ AI Tools — detection patterns for OpenAI, Anthropic, LangChain, and more
  • 100+ Themes — Tokyo Night, Catppuccin, Gruvbox, Nord, and custom TOML themes
  • CI/CDcomplior scan --ci --threshold 80 --json
  • Zero Config — auto-detects framework, AI SDK, risk level
  • Offline — scanner works without any API key or network

Architecture

Two processes: Rust TUI client connects to TypeScript daemon via HTTP/SSE.

┌─────────────────────────┐     HTTP / SSE      ┌─────────────────────────┐
│   RUST TUI (ratatui)    │ ◄────────────────► │   TS DAEMON (Hono)      │
│                         │   localhost:port    │                         │
│  Dashboard UI           │                    │  Scanner (AST, 5 layers)│
│  7 navigable pages      │  JSON req/resp     │  Fixer (6+ templates)   │
│  100+ themes            │  for scan/fix/etc  │  Regulation DB (JSON)   │
│  Vim + mouse nav        │                    │  AI Registry (5K+)      │
│  ~5MB binary            │  SSE stream        │  LLM (Vercel AI SDK)    │
│                         │  for events        │  MCP Server (stdio)     │
│                         │                    │  File Watcher           │
│                         │                    │  Reports (MD/PDF/badge) │
│                         │                    │  Agent Passport engine  │
└─────────────────────────┘                    └─────────────────────────┘

Key principle: Deterministic core, AI interface. Scanner uses AST-based rules — no LLM involved in compliance decisions. LLM helps you understand and fix issues.

7 TUI Pages

Key Page Description
D Dashboard Score gauge, activity log, deadlines, quick actions
S Scan Findings table, severity filter, file links
F Fix Fix preview with unified diff, one-click apply
P Passport Agent Passport viewer (36 fields, ed25519 signed)
T Timeline Obligation deadlines, EU AI Act milestones
R Report Compliance report generation (MD, PDF, badge)
L Log Activity log, engine events, SSE stream

Supported Regulations

Regulation Status
EU AI Act (Transparency) — Art. 50, 12, 4, 11 Implemented
EU AI Act (GPAI) — Art. 51-56 Implemented
EU AI Act (High-Risk) — Art. 9, 14, 15, 27 Planned
Colorado SB 205 — Disclosure + FRIA Planned
ISO 42001, NIST AI RMF Planned

Business Model: Free TUI → Paid Dashboard

Free TUI (open-source) Paid Dashboard (SaaS)
Scan Local project All repos in org
Score 0-100 + auto-fix Cross-system map
Reports COMPLIANCE.md, FRIA, badges Audit PDF, Certificate
Registry 200 tools (offline) 5,011+ tools (API)
Jurisdictions EU + 1 All
Agents MCP (8 tools) + Agent Registry UI
Monitoring Drift (session) Continuous + SLA
CI/CD Headless mode Webhook management
Price Free €49-399/mo

Installation

# npm (recommended)
npx complior

# Install script
curl -fsSL https://complior.ai/install.sh | sh

# Homebrew
brew install complior

# Cargo
cargo install complior

# Docker
docker run -it -v $(pwd):/project complior/complior

Quick Start

# 1. Initialize project (auto-discovers AI agents + creates passports)
complior init

# 2. Scan code for compliance gaps (5-layer static analysis)
complior scan

# 3. Evaluate live AI endpoint (688 dynamic tests)
complior eval http://localhost:4000/api/chat --agent my-bot

# 4. Apply recommended fixes
complior fix

# 5. Generate compliance documents (FRIA, policy, audit package)
complior fix --doc fria my-bot
complior passport audit-package

# 6. Launch TUI dashboard for continuous monitoring
complior
# CI/CD pipeline
complior scan --ci --threshold 80 --json
complior eval $API_URL --agent $AGENT --ci --threshold 70

All CLI Commands

Full flag reference: complior <command> --help

# ─── CORE ───
complior                                     # TUI dashboard (default)
complior init [path]                         # initialize .complior/ config
complior scan [path]                         # 5-layer static analysis
  --ci --threshold 80 --json --sarif --no-tui --quiet/-q
  --deep --llm --cloud                       # scan tiers (1/2/3)
  --fail-on critical --agent <name>
  --diff main --fail-on-regression --comment # PR diff mode
complior fix [path]                          # apply compliance fixes
  --dry-run --json --ai --source scan|eval
complior eval <url>                          # dynamic AI testing (688 tests)
  --det --llm --security --full              # test tiers
  --agent <name> --categories cat1,cat2
  --ci --threshold 80 --json --verbose
  -j 10 / --concurrency 10                  # parallelism (1-50)
  --api-key --request-template --response-path --headers  # custom adapter
  --model gpt-4o                             # LLM judge model
  --remediation --no-remediation --fix --dry-run
  --last --failures                          # cached results
complior audit <url>                         # full audit: scan + eval + security
  --agent <name> --json [path]
complior report [path]                       # compliance report
  --format md|pdf --output/-o file

# ─── PASSPORT (renamed from agent) ───
complior passport init [path]                  # (optional) manual agent discovery → passports
  --force --json                              # init does this automatically
complior passport list [path]                  # list all passports
  --verbose/-v --json
complior passport show <name> [path] --json  # show specific passport
complior passport rename <old> <new> [path]    # rename passport + re-sign
complior passport validate [name] [path]       # schema + signature + completeness
  --ci --strict --verbose --json
complior passport completeness <name> --json   # obligation gaps breakdown
complior passport autonomy [path] --json       # autonomy level (L1-L5)
complior passport diff <name> --json           # compare passport versions
complior passport evidence [--verify] --json  # evidence chain
complior passport permissions --json           # cross-agent permissions matrix
complior passport registry --json              # per-agent compliance registry
complior passport export <name> --format a2a  # export (a2a|aiuc-1|nist)
complior passport import --from a2a <file>     # import external passport
complior passport audit-package [-o file]      # audit package (tar.gz)
complior passport audit                        # audit trail (event log)
  --agent <name> --since DATE --type EVENT --limit N --json

# ─── DOCUMENT GENERATION (via fix) ───
complior fix --doc fria <name> [path]          # FRIA report (Art.27)
  --organization --impact --mitigation --approval --json
complior fix --doc notify <name> [path]        # worker notification (Art.26(7))
  --company --contact-name --contact-email --contact-phone
  --deployment-date --affected-roles --impact-description --json
complior fix --doc policy <name> --industry hr # AI usage policy (Art.6)
  --organization --approver --json [path]     # industries: hr|finance|healthcare|education|legal
complior fix --doc soa <name> [path]          # Statement of Applicability (ISO 42001)
complior fix --doc risk-register <name>       # Risk Register (ISO 42001)
complior fix --doc all <name>                  # generate all documents

# ─── CERTIFICATION ───
complior cert readiness <name> --json [path] # AIUC-1 readiness score
complior cert test <name> [path]             # adversarial tests
  --adversarial --categories cats --json

# ─── ANALYSIS ───
complior chat "question" --json --model m    # compliance assistant (LLM)
complior supply-chain [path] --models --json # AI dependency audit
complior cost --hourly-rate 200 --agent n    # remediation cost estimator
complior debt --trend --json                 # compliance debt score
complior simulate                            # what-if score projection
  --fix id --add-doc type --complete-passport field --json

# ─── DOCUMENTS ───
complior doc generate <name> --type TYPE     # single doc (ai-literacy, art5-screening,
  --all --organization "Acme" --json [path]  #   technical-documentation, incident-report,
                                             #   declaration-of-conformity, monitoring-policy)

# ─── INFRASTRUCTURE ───
complior daemon [start] --watch --port 4000  # background daemon
complior daemon status / stop
complior proxy start <cmd> [args...]         # MCP compliance proxy
complior proxy stop / status
complior tools status / update               # external security tools
complior redteam run --agent n --categories LLM01 --max-probes 50 --json
complior redteam last --json                 # last red-team report
complior redteam target <url> --ci --threshold 70 --json
complior import promptfoo --file f.json      # import Promptfoo results
complior jurisdiction list / show <code>     # EU/EEA jurisdiction data

# ─── SAAS ───
complior login / logout                      # SaaS auth
complior sync                                # sync all data with SaaS
  --passport --scan --docs --audit --evidence --registry --no-sync

# ─── UTILITIES ───
complior version                             # version and build info
complior doctor                              # system health diagnostics
complior update                              # check for updates

# ─── GLOBAL FLAGS (work with any command) ───
  --engine-url <URL>                         # engine URL override
  --resume                                   # resume previous session
  --theme <name>                             # color theme
  --yes / -y                                 # skip onboarding wizard
  --no-color                                 # disable colors (= NO_COLOR=1)

Project Structure

complior/
├── cli/           # Rust CLI + TUI — dashboard UI, daemon management, connects via HTTP/SSE
├── engine/
│   ├── core/      # @complior/engine — TS daemon (Clean Architecture)
│   └── npm/       # npm wrapper package (npx complior)
├── .github/       # CI/CD workflows
├── Cargo.toml     # Rust workspace root
├── package.json   # TS workspace root
└── CLAUDE.md      # Claude Code instructions

Contributing

Complior is in v8 daemon architecture. We welcome:

  • Feedback on the daemon-orchestrator design
  • Regulation expertise — help us model compliance requirements
  • AI tool data — detection patterns for AI SDKs
  • Issues for feature requests and ideas

See CONTRIBUTING.md for guidelines.

License

AGPL-3.0


Built by the Complior team. EU AI Act enforcement: August 2, 2026.