This analysis identified 56 compliance patterns across GDPR, HIPAA, PCI-DSS, SOC2, SOX, TCPA. After independent verification by Gemini 2.5 Flash, 2 high-severity findings were confirmed and 52 were identified as possible false positives — likely pattern matches in documentation or configuration files rather than application source code. The 2 confirmed findings represent the primary areas requiring attention.
| Framework | Regulatory Body | Max Penalty | Enforcement Trend |
|---|---|---|---|
| GDPR (9 high) | EU DPAs | Up to EUR 20M or 4% turnover | Cross-border enforcement rising |
| TCPA (8 high) | FCC | $500-$1,500 per violation | Class action filings at record levels |
| SOX (8 high) | SEC / PCAOB | Criminal penalties, delisting | IT controls under increased scrutiny |
| SOC2 (8 high) | AICPA | Loss of enterprise contracts | Mandatory for enterprise SaaS sales |
| PCI-DSS (7 high) | PCI SSC | Fines $5K-$100K/month | v4.0 enforcement accelerating |
| HIPAA (7 high) | HHS / OCR | Fines up to $1.5M/year per category | Increasing enforcement, record penalties in 2024 |
| Framework | High Risk | Confirmed | False Pos. | Medium | Concern | No Issue |
|---|---|---|---|---|---|---|
| GDPR | 9 | 0 | 10 | 0 | 1 | 0 |
| HIPAA | 7 | 1 | 9 | 1 | 1 | 1 |
| PCI-DSS | 7 | 1 | 9 | 2 | 0 | 1 |
| SOC2 | 8 | 1 | 9 | 1 | 1 | 0 |
| SOX | 8 | 0 | 8 | 0 | 0 | 0 |
| TCPA | 8 | 1 | 7 | 0 | 0 | 0 |
OpenDocket scans source code patterns — specifically whether code handles regulated data in compliance-aware ways. It searches for evidence of encryption, access controls, consent mechanisms, audit logging, and other patterns that regulators look for.
Claude Sonnet scans broadly — it finds every pattern that could indicate a compliance risk. This produces a comprehensive set of findings but includes noise from documentation files, config references, and test data.
Gemini 2.5 Flash then challenges each finding independently. It asks: is this evidence from actual application code? Would a regulator actually find this concerning? Is the severity appropriate?
The result is a tiered output:
The confirmed count is the number you should act on. The total count shows the full scope of what was examined.
Evidence is classified into three tiers based on file type:
A finding is only classified as High Risk if supported by at least two source code files with matching evidence. Documentation references alone produce Pattern of Concern at most.