AGENTS / GITHUB / asqav-compliance
githubinferredactive

asqav-compliance

provenance:github:jagmarques/asqav-compliance

Free GitHub Action: scan AI agent code for governance gaps. Audit trails, policy enforcement, revocation, human oversight. 0-100 compliance score on every PR.

View Source ↗First seen 29d agoNot yet hireable
README
<p align="center">
  <a href="https://asqav.com">
    <img src="https://asqav.com/logo-text-white.png" alt="asqav" width="200">
  </a>
</p>
<p align="center">
  Governance for AI agents. Audit trails, policy enforcement, and compliance.
</p>
<p align="center">
  <a href="https://opensource.org/licenses/MIT"><img src="https://img.shields.io/badge/License-MIT-yellow.svg?style=flat-square&logo=opensourceinitiative&logoColor=white" alt="License: MIT"></a>
  <a href="https://github.com/jagmarques/asqav-compliance"><img src="https://img.shields.io/badge/GitHub%20Action-AI%20Agent%20Governance-blue.svg?style=flat-square" alt="GitHub Action"></a>
  <a href="https://github.com/jagmarques/asqav-compliance"><img src="https://img.shields.io/github/stars/jagmarques/asqav-compliance?style=social" alt="GitHub stars"></a>
</p>
<p align="center">
  <a href="https://asqav.com">Website</a> |
  <a href="https://asqav.com/docs">Docs</a> |
  <a href="https://asqav.com/docs/sdk">SDK Guide</a> |
  <a href="https://asqav.com/compliance">Compliance</a>
</p>

# Compliance Scanner

Scan your AI agent code for governance gaps. Think "Dependabot but for AI agent compliance."

This free GitHub Action automatically scans your repository for AI agent framework usage (LangChain, CrewAI, OpenAI, Anthropic, AutoGen, and more) and checks whether each agent file follows governance best practices. It posts a compliance report directly as a PR comment on every pull request.

---

## What It Does

On every pull request, asqav-compliance will:

1. **Find** all Python files that import AI agent frameworks
2. **Analyse** each file for five governance categories
3. **Score** your repository's compliance (0-100)
4. **Post** a detailed report as a PR comment with pass/gap status and recommendations

### Example PR Comment

The action posts a formatted comment on your PR that includes:

- An overall compliance score with a visual badge
- A summary table showing how many agent files were scanned and which frameworks were detected
- A per-category breakdown (PASS or GAP) with details
- Actionable recommendations for each gap, linking to documentation
- A collapsible per-file breakdown so you can see exactly which files need attention

---

## Quick Start

Add this workflow file to your repository at `.github/workflows/ai-governance.yml`:

```yaml
name: AI Agent Governance
on: [pull_request]

jobs:
  compliance:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      - uses: jagmarques/asqav-compliance@v1
        with:
          github-token: ${{ secrets.GITHUB_TOKEN }}
```

That's it. The action will now run on every pull request and post a governance report.

### Inputs

| Input | Description | Required | Default |
|-------|-------------|----------|---------|
| `github-token` | GitHub token for posting PR comments | Yes | `${{ github.token }}` |
| `scan-path` | Path to scan (relative to repo root) | No | `.` (entire repo) |
| `fail-on-gaps` | Fail the check if governance gaps are found | No | `false` |

### Outputs

| Output | Description |
|--------|-------------|
| `score` | Compliance score (0-100) |
| `agent-files` | Number of agent files found |
| `gaps` | Total number of governance gaps |
| `report` | Full Markdown report |

### Advanced Example

```yaml
name: AI Agent Governance
on: [pull_request]

jobs:
  compliance:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4

      - uses: jagmarques/asqav-compliance@v1
        id: scan
        with:
          github-token: ${{ secrets.GITHUB_TOKEN }}
          scan-path: 'src/agents'
          fail-on-gaps: 'true'

      - name: Print score
        run: echo "Compliance score: ${{ steps.scan.outputs.score }}/100"
```

---

## What It Checks

The scanner evaluates five governance categories for every Python file that imports an AI agent framework:

### 1. Audit Trail
Are agent actions being logged or cryptographically signed?

Looks for: `import asqav`, `asqav.sign()`, `logging.getLogger`, `audit_trail`, `log_action`, `action_log`

### 2. Policy Enforcement
Are there constraints on what agents can do?

Looks for: `rate_limit`, `policy`, `scope`, `allowed_actions`, `action_gate`, `guard`, `max_iterations`, `timeout`

### 3. Revocation Capability
Can agents be disabled or shut down in an emergency?

Looks for: `revoke`, `disable`, `kill_switch`, `suspend`, `terminate`, `emergency_stop`, `circuit_breaker`

### 4. Human Oversight
Is there a human-in-the-loop for high-risk actions?

Looks for: `human_in_the_loop`, `hitl`, `approval`, `require_approval`, `multi_party`, `manual_review`

### 5. Error Handling
Are agent calls wrapped in proper error handling?

Looks for: `try/except` blocks around agent code

---

## Scoring

The compliance score ranges from **0 to 100**:

- Each of the 5 categories contributes up to **20 points**
- Points are proportional to the percentage of agent files that pass each check
- If all agent files pass all checks, the score is **100**

| Score Range | Meaning |
|-------------|---------|
| 80-100 | Strong governance posture |
| 50-79 | Some gaps to address |
| 0-49 | Significant governance gaps |

---

## Supported Frameworks

The scanner currently detects these AI agent frameworks:

- [LangChain](https://langchain.com/)
- [CrewAI](https://crewai.com/)
- [OpenAI](https://platform.openai.com/)
- [Anthropic](https://anthropic.com/)
- [AutoGen](https://microsoft.github.io/autogen/)
- [Google Generative AI (Gemini)](https://ai.google.dev/)
- [Smol Agents](https://huggingface.co/docs/smolagents/)
- [LlamaIndex](https://www.llamaindex.ai/)
- [Haystack](https://haystack.deepset.ai/)
- [Semantic Kernel](https://learn.microsoft.com/semantic-kernel/)

---

## Full Governance Platform

This GitHub Action provides a free, lightweight compliance scan. For the full governance platform with:

- Cryptographic audit trails with `asqav.sign()`
- Automated policy enforcement
- Real-time agent monitoring
- Compliance dashboards and reporting
- SOC 2 and ISO 27001 evidence generation

Visit **[asqav.com](https://asqav.com)** to learn more.

---

## Contributing

Contributions are welcome! Please open an issue or submit a pull request.

## License

[MIT](LICENSE)

PUBLIC HISTORY

First discoveredMar 21, 2026

IDENTITY

inferred

Identity inferred from code signals. No PROVENANCE.yml found.

Is this yours? Claim it →

METADATA

platformgithub
first seenMar 18, 2026
last updatedMar 19, 2026
last crawled1 day ago
version

README BADGE

Add to your README:

![Provenance](https://getprovenance.dev/api/badge?id=provenance:github:jagmarques/asqav-compliance)