Skip to content

firmis compliance - Compliance Evidence Reporting

Terminal window
firmis compliance report [path] [options]
firmis compliance frameworks

Auditors want evidence. Generating it manually is slow, error-prone, and miserable. firmis compliance generates it automatically from your scan results.

The report subcommand runs a full scan across your agent stack using all 324 detection rules, then maps every finding to the compliance frameworks you are working against. Each finding is linked to the exact control, article, or requirement it satisfies - with file locations, rule IDs, and timestamps formatted for submission.

The frameworks subcommand lists every supported framework and its controls without running a scan. Use it to understand what coverage you get before committing to a full report run.

Traditional compliance tooling was built for traditional software. It has no concept of what an MCP server is, what prompt injection looks like as a risk to document, or how an EU AI Act Article 13 transparency requirement differs from a GDPR data minimization obligation. Firmis maps your actual agent stack to these actual frameworks.

Supported frameworks: SOC 2, EU AI Act, GDPR, NIST AI RMF, OWASP Agentic Top 10, ISO 42001, MITRE ATLAS.

List supported frameworks and their controls

Section titled “List supported frameworks and their controls”
Terminal
npx firmis compliance frameworks

Generate a full compliance report across all frameworks

Section titled “Generate a full compliance report across all frameworks”
Terminal
npx firmis compliance report . --output compliance-report.txt
Terminal
npx firmis compliance report . --framework soc2 --output soc2-evidence.txt
Terminal
npx firmis compliance report . --format json --output compliance.json

EU AI Act mapping with verbose control detail

Section titled “EU AI Act mapping with verbose control detail”
Terminal
npx firmis compliance report . --framework ai-act --verbose

Scope to a single platform and suppress terminal output

Section titled “Scope to a single platform and suppress terminal output”
Terminal
npx firmis compliance report . --platform mcp --format json --output mcp-compliance.json --quiet
FlagTypeDefaultDescription
--framework <name>stringall frameworksFilter to one framework. Accepted values: soc2, ai-act, gdpr, nist, owasp, iso42001, mitre-atlas.
--format <type>stringterminalOutput format. terminal for human-readable output. json for programmatic processing or ticketing systems.
--output <file>stringstdoutWrite the report to a file instead of stdout.
--platform <name>stringall platformsScope the scan to a specific platform only.
--quietbooleanfalseSuppress all terminal output except the final report.
--verbosebooleanfalseShow detailed control-level mapping with rule IDs and evidence references.

No options. Prints all supported frameworks and their mapped controls.

CodeMeaning
0Report generated successfully.
1Unknown framework specified via --framework.
1Scan or report generation failed with an error.