Skip to content

Configuration Schema

Rulestatus is configured via a .rulestatus.yaml file in your project root. Run rulestatus init to create one interactively.

system:
name: "My Fraud Detection Model v1.0"
actor: provider # provider | deployer | importer | distributor
risk_level: high-risk # prohibited | high-risk | limited-risk | minimal-risk
domain: "financial services"
intended_use: "Automated fraud scoring for card transactions"
api_base_url: "https://api.yourcompany.com" # optional — used by API probe checks
frameworks:
- eu-ai-act
- iso-42001
- nist-ai-rmf
evidence:
docs_path: ./docs/compliance/ # scanned for documentation artifacts
model_card: ./model/model_card.yaml
risk_register: ./docs/risk_register.yaml
config_path: ./config/ # scanned for transparency/config checks
reporting:
format:
- console
- json
- sarif
output_dir: ./compliance-reports/
badge: false # also write compliance-badge.svg
severity_gate:
fail_on: critical # exit non-zero when any critical check fails
warn_on: major # print warning for major failures (does not fail CI)

Describes your AI system. Used to filter which checks apply.

FieldTypeRequiredDescription
namestringyesHuman-readable system name, included in every report
actorstringyesYour role: provider, deployer, importer, distributor
risk_levelstringyesEU AI Act risk classification: prohibited, high-risk, limited-risk, minimal-risk
domainstringnoBusiness domain (e.g. healthcare, financial services)
intended_usestringnoFree-text description of the system’s purpose
api_base_urlstringnoBase URL for API probe checks (Article 14 human oversight endpoints)

List of frameworks to run. Available values:

ValueDescription
eu-ai-actEU AI Act — Articles 6, 9, 10, 11, 13, 14, 15
iso-42001ISO/IEC 42001:2023 — Clauses 4–10
nist-ai-rmfNIST AI RMF 1.0 — GOVERN, MAP, MEASURE, MANAGE
colorado-sb24-205Colorado SB 24-205 — §§ 6-1-1702 through 6-1-1705

Paths where Rulestatus looks for compliance artifacts.

FieldDefaultDescription
docs_path./docs/compliance/Directory scanned for documentation artifacts (risk registers, model cards, etc.)
model_card(empty)Path to model card YAML
risk_register(empty)Path to risk register JSON or YAML
config_path./config/Directory scanned for configuration files (transparency config, etc.)
api_base_url(inherits from system.api_base_url)Override the base URL for API probe checks in this evidence context. Takes precedence over system.api_base_url.

Controls how results are output.

FieldDefaultDescription
format[console]List of output formats. Options: console, json, sarif, pdf, badge, junit
output_dir./compliance-reports/Directory for report files
badgefalseAlways write compliance-badge.svg regardless of format list

Controls when rulestatus exits non-zero (fails CI).

FieldDefaultDescription
fail_oncriticalExit non-zero if any result at this severity or above fails
warn_onmajorPrint a warning for results at this severity (does not fail CI)

Severity levels in order: critical > major > minor > info.