The terminal waits, a black screen humming with potential. You type a command, hit return, and raw data reveals itself — not random lines, but a structured map of sensitive PII. This is the Pii Catalog Zsh script in action. No noise. No wasted cycles. It identifies, lists, and indexes personally identifiable information across code, configs, and stored files.
At its core, Pii Catalog Zsh is a fast, shell-native way to scan repositories for PII exposure. Built for Zsh, it uses minimal dependencies and hooks directly into your existing workflows. It can parse project directories, flag matches with regex-based detection, and write results to organized catalogs. This removes guesswork when auditing compliance risks or preparing for SOC 2, GDPR, or HIPAA.
Installation is straightforward. Clone the repo, place the script where your $PATH can reach it, and give it execute permissions. A single command, such as pii_catalog ./src, will trigger a full scan. Results surface in plain text, CSV, or JSON. The script supports output piping so you can chain it with grep, jq, or custom post-processing.