vault· 56 findings · 5 confirmed high · ELEVATED RISK
Compliance Risk Analysis
vault
https://github.com/hashicorp/vault
Scanned 2026-03-23 · OpenDocket V1 · Primary: Claude Sonnet · Review: Gemini 2.5 Flash
Important Limitations of This Report
This report is not legal advice and is not defensible in court. It provides directional guidance only. To obtain a defensible compliance assessment, engage a licensed attorney and certified auditor.

Scope limitations: Only public repository content was analyzed. Infrastructure configuration, deployment settings, operational policies, vendor contracts, and staff training are outside scope.

A true compliance audit would also review: vendor contracts and BAAs, staff training records, incident response procedures, physical security controls, and system audit logs — none of which are visible in source code.
Risk Assessment

This analysis identified 56 compliance patterns across GDPR, HIPAA, PCI-DSS, SOC2, SOX, TCPA. After independent verification by Gemini 2.5 Flash, 5 high-severity findings were confirmed and 50 were identified as possible false positives — likely pattern matches in documentation or configuration files rather than application source code. The 5 confirmed findings represent the primary areas requiring attention.

ELEVATED RISK
5 confirmed high-severity findings
45 total patterns identified · 50 flagged as possible false positives by independent review
What This Means If Unaddressed
FrameworkRegulatory BodyMax PenaltyEnforcement Trend
HIPAA (9 high)HHS / OCRFines up to $1.5M/year per categoryIncreasing enforcement, record penalties in 2024
GDPR (9 high)EU DPAsUp to EUR 20M or 4% turnoverCross-border enforcement rising
TCPA (8 high)FCC$500-$1,500 per violationClass action filings at record levels
SOX (7 high)SEC / PCAOBCriminal penalties, delistingIT controls under increased scrutiny
SOC2 (6 high)AICPALoss of enterprise contractsMandatory for enterprise SaaS sales
PCI-DSS (6 high)PCI SSCFines $5K-$100K/monthv4.0 enforcement accelerating
Top Findings
High RiskGDPRGDPR-009CHANGELOG-v0.md:23 · Review: CONFIRMED
Conduct a formal Data Protection Impact Assessment as required under GDPR Article 35 for this high-risk data processing system. Document the DPIA findings, risk mitigation measures, and compliance con
High RiskPCI-DSSPCIDSS-008.build/entrypoint.sh:44 · Review: CONFIRMED
The system requires implementation of comprehensive cryptographic key management procedures that explicitly address all PCI DSS requirements including secure key generation algorithms, encrypted distr
High RiskSOC2SOC2-005.build/entrypoint.sh:49 · Review: CONFIRMED
Implement formal change management controls including: mandatory pull request reviews with approval requirements before merging code changes, documented deployment procedures with approval gates for p
Gemini Verification Layer
How to read this: The confirmed count is your action list. The false positive count shows where the scanner found keyword patterns in documentation rather than application source code. Click any finding to see exactly what evidence was found and why Gemini made its determination.
6Confirmed
0Context dependent
50Possible false positives
0Additional risk
Primary: Claude Sonnet (Anthropic). Verification: Gemini 2.5 Flash (Google). Neither constitutes legal advice.
Recommended Actions
High
For the capabilities described in `Makefile:62-64` (memory profiling) and the features documented in `CHANGELOG-v0.md:23`, `changelog/12422.txt:2`, and `changelog/25636.txt:2` (various forms of tracking), conduct a formal Data Protection Impact Assessment (DPIA). Document the DPIA findings and risk mitigation measures to comply with GDPR Article 35, which mandates DPIAs for high-risk data processing activities.
GDPR · GDPR-009 · Confirmed
High
Verify that the cryptographic key management procedures for Vault's Raft storage backend, referenced in `enos/modules/k8s_deploy_vault/raft-config.hcl`, and built-in credential engines (e.g., AWS, GitHub, as indicated by `.github/CODEOWNERS`), including key generation, distribution, storage, rotation, and destruction, are fully documented and implemented consistent with PCI DSS Requirements 3.6 and 3.7 to avoid severe audit findings.
PCI-DSS · PCIDSS-008 · Confirmed
High
Establish mandatory pull request reviews and approval requirements for changes to `.build/entrypoint.sh`, `.build/go.sh`, and `.copywrite.hcl`. This ensures all modifications to build processes and configuration are formally reviewed and approved, thereby preventing uncontrolled changes to critical system components as required by SOC2 CC8.1.
SOC2 · SOC2-005 · Confirmed
High
Formal security policies for acceptable use, data classification, and access management are absent from the repository, with files such as `CONTRIBUTING.md` and `.github/CODE_OF_CONDUCT.md` not fulfilling this requirement. New policy documents must be created and stored in an accessible location, as mandated by SOC2 CC1.1 for demonstrating ethical values and integrity.
SOC2 · SOC2-010 · Confirmed
High
Clarify and document the role-based access controls (RBAC) and approval procedures for `@hashicorp/github-secure-vault-core` and `@hashicorp/team-vault-quality` defined in `.github/CODEOWNERS` for changes to `.github/workflows/build.yml`. This ensures stringent authorization of personnel involved in the financial system's deployment, addressing SOX Section 404 internal control requirements.
SOX · SOX-002 · Confirmed
+ 1 more recommendations in the Findings tab
Risk Scorecard
FrameworkHigh RiskConfirmedFalse Pos.MediumConcernNo Issue
GDPR919010
HIPAA9010010
PCI-DSS628211
SOC2628220
SOX717100
TCPA808000
Domains Detected
Saas
75.0%
Ecommerce
44.2%
Communication
32.3%
Fintech
24.9%
Healthcare
14.8%
Gdpr
12.5%
Framework:
Severity:
GDPR
EU DPAs · Up to EUR 20M or 4% turnover
10 findings · 9 possible FP
GDPR-009
High Risk
Regulatory Standard
Gemini Verification
CONFIRMED
Despite evidence being in documentation and config files, these files (changelogs documenting features, Makefiles defining build capabilities) confirm the existence of high-risk functionalities (memory profiling capturing heap usage, client tracking, encryption count tracking) within the `vault` application, which inherently processes highly sensitive data, making a Data Protection Impact Assessment (DPIA) critical under GDPR Article 35.
Gemini 2.5 Flash · Confidence: HIGH
Evidence
[DOCS] CHANGELOG-v0.md:23 * autounseal/azure: Fix key version tracking (Enterprise) [CONFIG] Makefile:62 # *-mem variants will enable memory profiling which will write snapshots of heap usage [CONFIG] Makefile:64 # Note that any build can have profiling added via: `$ BUILD_TAGS=memprofiler make ...` [DOCS] changelog/12422.txt:2 ui: updated client tracking config view [DOCS] changelog/25636.txt:2 core: make the best effort timeout for encryption count tracking persistence configurable via an env [DOCS] changelog/28494.txt:2 proxy/cache (enterprise): Fixed a data race that could occur while tracking capabilities in Proxy's [DOCS] changelog/29303.txt:2 core (enterprise): Add tracking of performance standbys by their HA node ID so that RPC connections [DOCS] changelog/30425.txt:2 **UI Telemetry**: add Posthog for UI telemetry tracking on HVD managed clusters
Finding
Does the system process personal data in a manner likely to result in high risk to data subjects, and if so, is there evidence that a Data Protection Impact Assessment has been considered, as required under Article 35?
Remediation
For the capabilities described in `Makefile:62-64` (memory profiling) and the features documented in `CHANGELOG-v0.md:23`, `changelog/12422.txt:2`, and `changelog/25636.txt:2` (various forms of tracking), conduct a formal Data Protection Impact Assessment (DPIA). Document the DPIA findings and risk mitigation measures to comply with GDPR Article 35, which mandates DPIAs for high-risk data processing activities.
Remediation refined by Gemini review
Possible False Positives (9)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
HIPAA
HHS / OCR · Fines up to $1.5M/year per category
10 findings · 10 possible FP
Possible False Positives (10)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
PCI-DSS
PCI SSC · Fines $5K-$100K/month
10 findings · 8 possible FP
PCIDSS-008
High Risk
Regulatory Standard
Gemini Verification
CONFIRMED
The finding correctly identifies a high-risk compliance area for the 'vault' repository, a dedicated key management system, regarding PCI-DSS key management practices. Although the evidence cites configuration files, these files are integral to the system's core functionality (e.g., Raft storage, credential engines), making the question of key management procedures highly relevant and not a false positive.
Gemini 2.5 Flash · Confidence: HIGH
Evidence
[CONFIG] .build/entrypoint.sh:44 # Assume that /build is where we've mounted the vault repo. [CONFIG] .copywrite.hcl:16 "enos/modules/k8s_deploy_vault/raft-config.hcl", [CONFIG] .github/CODEOWNERS:7 * @hashicorp/vault [CONFIG] .github/CODEOWNERS:10 /builtin/credential/aws/ @hashicorp/vault-ecosystem [CONFIG] .github/CODEOWNERS:11 /builtin/credential/github/ @hashicorp/vault-ecosystem [CONFIG] .github/CODEOWNERS:12 /builtin/credential/ldap/ @hashicorp/vault-ecosystem [CONFIG] .github/CODEOWNERS:13 /builtin/credential/okta/ @hashicorp/vault-ecosystem [CONFIG] .github/CODEOWNERS:16 /builtin/logical/aws/ @hashicorp/vault-ecosystem
Finding
Does the system implement cryptographic key management procedures including key generation, distribution, storage, rotation, and destruction, consistent with PCI DSS Requirement 3.6 and 3.7?
Remediation
Verify that the cryptographic key management procedures for Vault's Raft storage backend, referenced in `enos/modules/k8s_deploy_vault/raft-config.hcl`, and built-in credential engines (e.g., AWS, GitHub, as indicated by `.github/CODEOWNERS`), including key generation, distribution, storage, rotation, and destruction, are fully documented and implemented consistent with PCI DSS Requirements 3.6 and 3.7 to avoid severe audit findings.
Remediation refined by Gemini review
PCIDSS-006
Medium Risk
Regulatory Standard
Gemini Verification
CONFIRMED
The evidence, though documentation and config, explicitly details development practices focused on linting and formatting, which are insufficient to meet PCI-DSS requirements for comprehensive security testing (SAST, DAST, penetration testing, security-focused code review), thus confirming the identified gap in controls.
Gemini 2.5 Flash · Confidence: HIGH
Evidence
[DOCS] .github/instructions/generic/ember_general.instructions.md:35 - **Development**: ESLint for code linting, Prettier for code formatting [DOCS] .github/instructions/generic/ember_general.instructions.md:35 - **Development**: ESLint for code linting, Prettier for code formatting [DOCS] .github/instructions/generic/golang.instructions.md:138 - Understand escape analysis and stack vs heap allocation [DOCS] .github/instructions/generic/golang.instructions.md:155 - Understand escape analysis and stack vs heap allocation [CONFIG] .github/workflows/actionlint.yml:1 name: Lint GitHub Actions Workflows [CONFIG] .github/workflows/actionlint.yml:14 actionlint: [CONFIG] .github/workflows/actionlint.yml:18 - name: "Run actionlint" [CONFIG] .github/workflows/actionlint.yml:20 docker run --rm -v "$(pwd):/repo" --workdir /repo docker.mirror.hashicorp.services/rhysd/actionlint@
Finding
Does the system implement security testing controls including code review, static analysis, and penetration testing practices, as required under PCI DSS Requirement 6.3 and 11.4?
Remediation
Update `.github/instructions/generic/ember_general.instructions.md` and `.github/instructions/generic/golang.instructions.md` to detail mandatory security code reviews, security-focused SAST tools, DAST, and penetration testing practices, moving beyond basic linting, to comply with PCI DSS Requirements 6.3 and 11.4.
Remediation refined by Gemini review
Possible False Positives (8)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
SOC2
AICPA · Loss of enterprise contracts
10 findings · 8 possible FP
SOC2-005
High Risk
Regulatory Standard
Gemini Verification
CONFIRMED
The identified risk pertains to change management controls over build scripts and critical configuration files, which are integral to the software's build and deployment lifecycle, making the absence of such controls a confirmed high-risk SOC2 violation.
Gemini 2.5 Flash · Confidence: HIGH
Evidence
[CONFIG] .build/entrypoint.sh:49 cd build || exit 1 [CONFIG] .build/go.sh:8 curl -L "https://go.dev/dl/go${GO_VERSION}.linux-${host_arch}.tar.gz" | tar -C /opt -zxv [CONFIG] .copywrite.hcl:1 schema_version = 1 [CONFIG] .copywrite.hcl:16 "enos/modules/k8s_deploy_vault/raft-config.hcl", [CONFIG] .copywrite.hcl:20 "enos/.terraform/**", [DOCS] .github/ISSUE_TEMPLATE.md:15 <!-- The version can be retrieved with `vault version`. --> [DOCS] .github/ISSUE_TEMPLATE.md:17 * Vault Version: [DOCS] .github/ISSUE_TEMPLATE/bug_report.md:31 * Vault Server Version (retrieve with `vault status`):
Finding
Does the system demonstrate evidence of change management controls including version control, code review processes, and controlled deployment procedures, as required under CC8.1 for managing changes to infrastructure, data, software, and procedures?
Remediation
Establish mandatory pull request reviews and approval requirements for changes to `.build/entrypoint.sh`, `.build/go.sh`, and `.copywrite.hcl`. This ensures all modifications to build processes and configuration are formally reviewed and approved, thereby preventing uncontrolled changes to critical system components as required by SOC2 CC8.1.
Remediation refined by Gemini review
SOC2-010
High Risk
Regulatory Standard
Gemini Verification
CONFIRMED
The primary analysis correctly identifies the absence of critical security policy documentation (acceptable use, data classification, access management) within the repository, a direct violation of SOC2 CC1.1, and the provided evidence does not fulfill these requirements.
Gemini 2.5 Flash · Confidence: HIGH
Evidence
[DOCS] .github/CODE_OF_CONDUCT.md:3 HashiCorp Community Guidelines apply to you when interacting with the community here on GitHub and c [CONFIG] .github/workflows/changelog-checker.yml:53 echo "Reference - https://github.com/hashicorp/vault/blob/main/CONTRIBUTING.md#changelog-entries" [DOCS] CONTRIBUTING.md:1 # Contributing to Vault [DOCS] ui/README.md:18 - [Contributing / Best Practices](#contributing--best-practices) [DOCS] ui/README.md:151 ### Contributing / Best Practices [DOCS] ui/README.md:153 Hello and thank you for contributing to the Vault UI! Below is a list of patterns we follow on the U [CONFIG] ui/app/components/app-footer.hbs:35 @text="Contributing docs" [CONFIG] ui/app/templates/docs.hbs:41 Contributing docs
Finding
Does the system demonstrate evidence of documented security policies, including acceptable use, data classification, and access management policies, as required under CC1.1 for the entity's commitment to integrity and ethical values?
Remediation
Formal security policies for acceptable use, data classification, and access management are absent from the repository, with files such as `CONTRIBUTING.md` and `.github/CODE_OF_CONDUCT.md` not fulfilling this requirement. New policy documents must be created and stored in an accessible location, as mandated by SOC2 CC1.1 for demonstrating ethical values and integrity.
Remediation refined by Gemini review
Possible False Positives (8)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
SOX
SEC / PCAOB · Criminal penalties, delisting
8 findings · 7 possible FP
SOX-002
High Risk
Regulatory Standard
Gemini Verification
CONFIRMED
The evidence, while consisting of configuration files, directly demonstrates the implementation of repository-level access controls (CODEOWNERS) for critical build workflows. For a system potentially handling financial data, these controls over the integrity of the build and deployment pipeline are essential aspects of 'Access Controls to Financial Systems' under SOX Section 404.
Gemini 2.5 Flash · Confidence: HIGH
Evidence
[CONFIG] .github/CODEOWNERS:62 /.github/workflows/build.yml @hashicorp/github-secure-vault-core @hashicorp/team-vault-quality [CONFIG] .github/actions/build-vault/action.yml:74 # Restore the UI asset from the UI build workflow. Never use a partial restore key. [CONFIG] .github/actions/checkout/action.yml:33 # Determine our desired checkout ref and fetch depth. Depending our our workflow event [CONFIG] .github/actions/metadata/action.yml:5 name: Gather and export useful workflow metadata information. [CONFIG] .github/actions/metadata/action.yml:8 might want for variables or flow control in our various workflows. We centralize it here so as [CONFIG] .github/actions/metadata/action.yml:9 to have a single point of truth. This workflow also handles checking out the correct Git reference [CONFIG] .github/actions/metadata/action.yml:10 depending on workflow trigger and tags. This workflow is used in both CE and Ent and thus needs [CONFIG] .github/actions/metadata/action.yml:26 value: ${{ steps.workflow-metadata.outputs.compute-build }}
Finding
Does the system implement access controls that restrict access to financial systems and data to authorized personnel, with appropriate authentication and authorization mechanisms, as required under SOX Section 404 internal controls?
Remediation
Clarify and document the role-based access controls (RBAC) and approval procedures for `@hashicorp/github-secure-vault-core` and `@hashicorp/team-vault-quality` defined in `.github/CODEOWNERS` for changes to `.github/workflows/build.yml`. This ensures stringent authorization of personnel involved in the financial system's deployment, addressing SOX Section 404 internal control requirements.
Remediation refined by Gemini review
Possible False Positives (7)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
TCPA
FCC · $500-$1,500 per violation
8 findings · 8 possible FP
Possible False Positives (8)Gemini flagged these as likely pattern matches in non-source-code files. Review before acting.
What This Analysis Covers

OpenDocket scans source code patterns — specifically whether code handles regulated data in compliance-aware ways. It searches for evidence of encryption, access controls, consent mechanisms, audit logging, and other patterns that regulators look for.

What It Does Not Cover
  • Only public repository content is analyzed
  • Files in .gitignore are not scanned
  • Infrastructure, deployment, and cloud configuration are outside scope
  • Operational policies and procedures are outside scope
  • This analysis covers code at time of scan — changes after scan date are not reflected
Legal Limitations
  • This report is not defensible in court
  • It does not constitute legal advice
  • It does not satisfy regulatory audit requirements
  • To obtain a defensible compliance assessment, engage a licensed compliance attorney and certified auditor
  • OpenDocket provides directional guidance only
How Findings Are Generated
  • Primary analysis by Claude Sonnet (Anthropic)
  • Verification by Gemini 2.5 Flash (Google)
  • Question libraries are open source and community-maintained
  • All questions cite regulatory source text
  • Questions have not been validated by a licensed attorney
Why Two Models?

Claude Sonnet scans broadly — it finds every pattern that could indicate a compliance risk. This produces a comprehensive set of findings but includes noise from documentation files, config references, and test data.

Gemini 2.5 Flash then challenges each finding independently. It asks: is this evidence from actual application code? Would a regulator actually find this concerning? Is the severity appropriate?

The result is a tiered output:

  • CONFIRMED — Gemini agrees this is a real risk
  • CONTEXT DEPENDENT — Risk depends on deployment/infrastructure
  • POSSIBLE FALSE POSITIVE — Likely noise, review before acting

The confirmed count is the number you should act on. The total count shows the full scope of what was examined.

Evidence Tiers

Evidence is classified into three tiers based on file type:

  • [SOURCE] — Application source code (.ts, .py, .go, .rs, etc.) — strongest evidence
  • [CONFIG] — Configuration files (.yml, .json, .toml, Dockerfile) — moderate evidence
  • [DOCS] — Documentation (.md, .txt, .html) — context only, cannot produce High Risk findings

A finding is only classified as High Risk if supported by at least two source code files with matching evidence. Documentation references alone produce Pattern of Concern at most.

How to Use This Report
  • Share with your engineering lead for remediation planning
  • Share with your attorney as a starting point for compliance review
  • Re-scan after remediation to track progress
  • Do not present this as proof of compliance