About
This MCP server integrates the Have I Been Pwned API, allowing users to verify if emails or passwords have been exposed in data breaches and retrieve detailed breach information.
Capabilities
The Have I Been Pwned MCP Server bridges the gap between AI assistants and one of the most widely used breach‑lookup services, Have I Been Pwned (HIBP). By exposing a concise set of tools over the Model Context Protocol, it lets developers and end users query breach data without leaving their conversational AI environment. This eliminates the need to manually visit the HIBP website, copy‑paste email addresses, or manage API keys in separate tools, thereby streamlining security checks into a single workflow.
At its core, the server offers four straightforward yet powerful operations:
- check_email – Determines whether a supplied email address appears in any known data breaches and returns the number of incidents along with a brief summary.
- check_password – Uses HIBP’s k‑anonymity API to safely verify if a password has ever been exposed, providing frequency statistics and recommendations.
- get_breach_details – Retrieves in‑depth information about a particular breach, including the date, domain, affected accounts, and leaked data types.
- list_all_breaches – Enumerates every breach recorded by HIBP, optionally filtered by domain, enabling discovery of broader threat trends.
These capabilities are especially valuable for developers building security‑aware applications. An AI assistant can now prompt users to verify their credentials, automatically suggest password hygiene improvements, or surface detailed breach reports during a security audit. For example, a support chatbot could ask a customer whether their email has been compromised and immediately present actionable steps—change passwords, enable two‑factor authentication, or consult a password manager—all without switching contexts.
Integration with AI workflows is seamless: the server registers itself as an MCP service, and clients such as Claude or VS Code extensions can invoke its tools directly from the chat. Because each tool returns structured JSON, downstream components (e.g., UI panels or automated remediation scripts) can consume the data programmatically. The server also respects HIBP’s rate‑limiting policies and leverages the API key securely via environment variables, ensuring compliance with usage terms.
What sets this MCP apart is its focus on privacy and usability. By handling the k‑anonymity lookup internally, it guarantees that raw passwords never leave the client’s environment. The concise tool set reduces cognitive load for users, while still offering depth when needed (e.g., detailed breach reports). For developers looking to embed breach awareness into conversational agents or security dashboards, the Have I Been Pwned MCP Server provides a lightweight, ready‑to‑use bridge that turns raw breach data into actionable insights.
Related Servers
Netdata
Real‑time infrastructure monitoring for every metric, every second.
Awesome MCP Servers
Curated list of production-ready Model Context Protocol servers
JumpServer
Browser‑based, open‑source privileged access management
OpenTofu
Infrastructure as Code for secure, efficient cloud management
FastAPI-MCP
Expose FastAPI endpoints as MCP tools with built‑in auth
Pipedream MCP Server
Event‑driven integration platform for developers
Weekly Views
Server Health
Information
Explore More Servers
100 Training MCP Servers
Build and test 100 MCP servers quickly
MCP Workers AI
AI-powered Cloudflare Workers MCP integration
MCP Search Analytics Server
Unified Google Analytics & Search Console Insights via MCP
Mcp Server Iris
InterSystems IRIS Model Context Protocol server
Visio MCP Server
Automate Visio diagram creation via Python API
Goodnews MCP Server
Positive news at your fingertips