Skip to content
| Marketplace
Sign in
Visual Studio Code>Linters>ComplyKitNew to Visual Studio Code? Get it now.
ComplyKit

ComplyKit

nuvlabs

|
1 install
| (0) | Free
SOC 2 · HIPAA · ISO 27001 · PCI DSS compliance scanning inside VS Code
Installation
Launch VS Code Quick Open (Ctrl+P), paste the following command, and press enter.
Copied to clipboard
More Info

ComplyKit for VS Code

SOC 2 · HIPAA · ISO 27001 · PCI DSS · CIS compliance scanning directly inside your editor.

ComplyKit scans your cloud infrastructure — AWS, Terraform, Kubernetes, GitHub, GCP, Azure — and surfaces failing controls as findings in a dedicated sidebar panel. Click any finding to see exactly what failed and how to fix it.


Features

Compliance Findings Panel

Browse all findings grouped by provider, sorted by score (worst first). Failed checks are highlighted with severity badges — critical, high, medium, low.

Click-to-Remediate

Click any finding to open a detail panel showing the full remediation guide, which compliance controls it maps to (e.g. SOC 2 CC6.1, ISO 27001 A.12.6), and the severity.

Multi-Framework Support

Choose your framework at scan time — or run All Frameworks in parallel and see every control mapping in one pass.

Provider Picker

Select exactly what to scan: AWS, Terraform, GitHub, Kubernetes, GCP, Azure, Policy — or all at once.

GitHub Auto-Detect

If you have the GitHub CLI installed and logged in (gh auth login), ComplyKit picks up your token and organisation automatically — no config needed.

Status Bar Score

Live compliance score shown in the status bar, colour-coded: green ≥80, amber 50–79, red <50.

Auto-Scan on Save

Optionally trigger a Terraform scan every time you save a .tf file.

Loads Last Scan Instantly

On startup, ComplyKit loads your most recent scan result from ~/.complykit/evidence/ so findings are visible immediately without waiting for a fresh scan.


Requirements

Install the comply CLI:

brew install nuvlabs/tap/comply

Or download from GitHub Releases.


Quick Start

  1. Install the extension and the comply CLI
  2. Click the shield icon in the Activity Bar to open the ComplyKit panel
  3. Click ▶ Run Scan and pick your framework + providers
  4. Click any failing finding to see the remediation guide

Extension Settings

Setting Default Description
complykit.binaryPath comply Path to the comply binary
complykit.framework soc2 Default framework (used for per-file Terraform scans)
complykit.githubOwner `` GitHub org/user (auto-detected if unset)
complykit.terraformDir . Directory containing Terraform files
complykit.autoScanOnSave false Auto-scan Terraform on save
complykit.dashboardUrl http://localhost:8080 ComplyKit dashboard URL

CI/CD Integration

Use --fail-below to gate pipelines:

- run: comply scan --framework soc2 --only terraform --fail-below 80

See GitHub Actions templates for ready-made workflows.


Links

  • complykit.io
  • GitHub
  • Report an issue
  • Contact us
  • Jobs
  • Privacy
  • Manage cookies
  • Terms of use
  • Trademarks
© 2026 Microsoft