MCPSERV.CLUB
MCP-Mirror

Have I Been Pwned MCP Server

MCP Server

Secure your accounts with real‑time breach checks

Stale(50)
0stars
1views
Updated Mar 28, 2025

About

This MCP server integrates the Have I Been Pwned API, allowing users to verify if emails or passwords have been exposed in data breaches and retrieve detailed breach information.

Capabilities

Resources
Access data sources
Tools
Execute functions
Prompts
Pre-built templates
Sampling
AI model interactions

smithery badge

The Have I Been Pwned MCP Server bridges the gap between AI assistants and one of the most widely used breach‑lookup services, Have I Been Pwned (HIBP). By exposing a concise set of tools over the Model Context Protocol, it lets developers and end users query breach data without leaving their conversational AI environment. This eliminates the need to manually visit the HIBP website, copy‑paste email addresses, or manage API keys in separate tools, thereby streamlining security checks into a single workflow.

At its core, the server offers four straightforward yet powerful operations:

  • check_email – Determines whether a supplied email address appears in any known data breaches and returns the number of incidents along with a brief summary.
  • check_password – Uses HIBP’s k‑anonymity API to safely verify if a password has ever been exposed, providing frequency statistics and recommendations.
  • get_breach_details – Retrieves in‑depth information about a particular breach, including the date, domain, affected accounts, and leaked data types.
  • list_all_breaches – Enumerates every breach recorded by HIBP, optionally filtered by domain, enabling discovery of broader threat trends.

These capabilities are especially valuable for developers building security‑aware applications. An AI assistant can now prompt users to verify their credentials, automatically suggest password hygiene improvements, or surface detailed breach reports during a security audit. For example, a support chatbot could ask a customer whether their email has been compromised and immediately present actionable steps—change passwords, enable two‑factor authentication, or consult a password manager—all without switching contexts.

Integration with AI workflows is seamless: the server registers itself as an MCP service, and clients such as Claude or VS Code extensions can invoke its tools directly from the chat. Because each tool returns structured JSON, downstream components (e.g., UI panels or automated remediation scripts) can consume the data programmatically. The server also respects HIBP’s rate‑limiting policies and leverages the API key securely via environment variables, ensuring compliance with usage terms.

What sets this MCP apart is its focus on privacy and usability. By handling the k‑anonymity lookup internally, it guarantees that raw passwords never leave the client’s environment. The concise tool set reduces cognitive load for users, while still offering depth when needed (e.g., detailed breach reports). For developers looking to embed breach awareness into conversational agents or security dashboards, the Have I Been Pwned MCP Server provides a lightweight, ready‑to‑use bridge that turns raw breach data into actionable insights.