Claude-code-plugins-plus-skills klingai-compliance-review

install
source · Clone the upstream repo
git clone https://github.com/jeremylongshore/claude-code-plugins-plus-skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/jeremylongshore/claude-code-plugins-plus-skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/plugins/saas-packs/klingai-pack/skills/klingai-compliance-review" ~/.claude/skills/jeremylongshore-claude-code-plugins-plus-skills-klingai-compliance-review && rm -rf "$T"
manifest: plugins/saas-packs/klingai-pack/skills/klingai-compliance-review/SKILL.md
source content

Kling AI Compliance Review

Overview

Security and compliance assessment framework for Kling AI integrations. Covers data handling, credential management, content policy, privacy, and regulatory considerations.

Data Flow Assessment

User Prompt → [Your App] → [Kling AI API] → [Kling GPU Cluster]
                                                     ↓
[Your CDN] ← download ← [Kling CDN (temporary URL)] ← Generated Video

Data Residency

DataLocationRetention
PromptsSent to Kling servers (China/global)Processing only
Generated videosKling CDN (temporary URLs)~24-72 hours
API keysYour infrastructureYou control
Audit logsYour infrastructureYou control

Security Checklist

Credential Security

  • AK/SK stored in secrets manager (not env files, not code)
  • Keys rotated quarterly
  • Separate keys per environment
  • JWT tokens never logged
  • Access key prefix logged (first 8 chars only)
# Safe logging pattern
def safe_log_key(access_key: str) -> str:
    return access_key[:8] + "..." + access_key[-4:]

Network Security

  • All API calls over HTTPS (enforced by base URL)
  • Webhook endpoints use HTTPS with valid TLS cert
  • Network egress rules allow
    api.klingai.com:443
  • No API keys in query strings (Bearer token in header only)

Input Validation

  • Prompt length validated (<= 2500 chars)
  • Image URLs validated before sending
  • User input sanitized against injection
  • Content policy pre-filtering active

Output Handling

  • Kling CDN URLs treated as temporary
  • Videos downloaded and stored on your infrastructure
  • Generated content scanned before serving to end users
  • Video metadata stripped of sensitive info before public delivery

Privacy Assessment

QuestionConsideration
Do prompts contain PII?Filter PII before sending to API
Do images contain faces?Check consent requirements (GDPR Art. 6)
Are generated videos stored?Define retention policy
Who has access to generated content?RBAC on storage layer
Cross-border data transfer?Kling API servers may be in China

GDPR Considerations

class GDPRCompliantClient:
    """Kling client with GDPR data handling."""

    def __init__(self, base_client, audit_logger):
        self.client = base_client
        self.audit = audit_logger

    def text_to_video(self, prompt: str, data_subject_id: str = None, **kwargs):
        # Log processing activity (GDPR Art. 30)
        self.audit.log("processing_activity", "system", {
            "purpose": "video_generation",
            "data_subject": data_subject_id,
            "legal_basis": "legitimate_interest",
            "data_categories": ["text_prompt"],
            "recipients": ["klingai_api"],
        })

        return self.client.text_to_video(prompt, **kwargs)

    def handle_deletion_request(self, data_subject_id: str):
        """Handle GDPR right to erasure (Art. 17)."""
        # Delete stored videos associated with the data subject
        # Delete audit logs referencing the data subject
        # Note: cannot delete data already sent to Kling API
        self.audit.log("deletion_request", "system", {
            "data_subject": data_subject_id,
            "action": "processed",
        })

Automated Compliance Check

def run_compliance_check(config: dict) -> dict:
    """Run automated compliance checks against configuration."""
    checks = []

    # Check credential storage
    if config.get("key_source") == "environment":
        checks.append(("WARN", "credentials", "Using env vars; prefer secrets manager"))
    elif config.get("key_source") == "secrets_manager":
        checks.append(("PASS", "credentials", "Using secrets manager"))

    # Check TLS
    if config.get("base_url", "").startswith("https://"):
        checks.append(("PASS", "tls", "HTTPS enforced"))
    else:
        checks.append(("FAIL", "tls", "Not using HTTPS"))

    # Check content filtering
    if config.get("content_filter_enabled"):
        checks.append(("PASS", "content_filter", "Pre-submission filtering active"))
    else:
        checks.append(("WARN", "content_filter", "No pre-submission content filtering"))

    # Check audit logging
    if config.get("audit_logging"):
        checks.append(("PASS", "audit", "Audit logging enabled"))
    else:
        checks.append(("FAIL", "audit", "No audit logging"))

    # Print report
    for status, area, message in checks:
        icon = {"PASS": "OK", "WARN": "!!", "FAIL": "XX"}[status]
        print(f"  [{icon}] {area}: {message}")

    return {
        "passed": sum(1 for s, _, _ in checks if s == "PASS"),
        "warnings": sum(1 for s, _, _ in checks if s == "WARN"),
        "failed": sum(1 for s, _, _ in checks if s == "FAIL"),
    }

Resources