EU AI Act compliance scanner for Python AI agents — scan, analyze, and remediate
EU AI Act compliance scanning for Claude Desktop, Cursor, and any MCP-compatible client.
Unlike other compliance scanners that only report problems, AIR Blackbox also remediates — generating working code fixes, trust layer integrations, and full compliance reports.
| Tier | Tool | What it does |
|---|---|---|
| Scanning | scan_code | Scan Python code string for all 6 EU AI Act articles |
| Scanning | scan_file | Read and scan a single Python file |
| Scanning | scan_project | Recursively scan all .py files in a directory |
| Analysis | analyze_with_model | Deep analysis via local fine-tuned model (Ollama) |
| Analysis | check_injection | Detect prompt injection attacks (15 patterns) |
| Analysis | classify_risk | Classify tools by EU AI Act risk level |
| Remediation | add_trust_layer | Generate trust layer integration code |
| Remediation | suggest_fix | Get article-specific fix recommendations |
| Documentation | explain_article | Technical explanation of EU AI Act articles |
| Documentation | generate_compliance_report | Full markdown compliance report |
LangChain, CrewAI, AutoGen, OpenAI, Haystack, LlamaIndex, Semantic Kernel, and generic RAG pipelines.
pip install air-blackbox-mcpEdit ~/Library/Application Support/Claude/claude_desktop_config.json:
{
"mcpServers": {
"air-blackbox": {
"command": "python3",
"args": ["-m", "air_blackbox_mcp"]
}
}
}Restart Claude Desktop. The 10 tools will appear automatically.
Add to .cursor/mcp.json in your project:
{
"mcpServers": {
"air-blackbox": {
"command": "python3",
"args": ["-m", "air_blackbox_mcp"]
}
}
}In Claude Desktop or Cursor, just ask:
send_email"For AI-powered analysis beyond regex patterns:
# Install Ollama
brew install ollama
# Pull the fine-tuned compliance model
ollama pull air-compliance-v2
# The analyze_with_model tool will automatically use itOther MCP compliance tools only scan. AIR Blackbox: