io.github.darrenjrobinson/hibp

编码与调试

by darrenjrobinson

为 Have I Been Pwned(HIBP)API 提供的 Model Context Protocol(MCP)服务器,用于查询泄露相关信息。

什么是 io.github.darrenjrobinson/hibp

为 Have I Been Pwned(HIBP)API 提供的 Model Context Protocol(MCP)服务器,用于查询泄露相关信息。

README

Have I Been Pwned MCP Server

A Model Context Protocol (MCP) server for the Have I Been Pwned (HIBP) API that allows you to query breach data using natural language.

Overview

This MCP server provides tools to interact with the Have I Been Pwned API, allowing you to:

  • Check if an email address has been in a data breach
  • Get details about specific breaches
  • Check if a password has been exposed in known data breaches
  • Check if an email address appears in pastes

GitHub Repo

NPM Package

Blog

<video width="600" controls> <source src="./demo/HIBP%20MCP%20Demo.mp4" type="video/mp4"> Your browser does not support the video tag. </video>

Installation & Configuration

Option 1: NPM Installation (Recommended)

  1. Install Node.js (v22.10.0 or higher recommended)
  2. Get your HIBP API key from https://haveibeenpwned.com/API/Key
  3. Configure your MCP client (e.g., Claude Desktop ) with:
json
{
  "mcpServers": {
    "HIBP-MCP": {
      "command": "npx",
      "args": ["-y", "@darrenjrobinson/hibp-mcp"],
      "env": {
        "HIBP_API_KEY": "<your-hibp-api-key>",
        "HIBP_SUBSCRIPTION_PLAN": "Pwned 1"
      }
    }
  }
}

Option 2: Local Development

  1. Clone this repository:
bash
git clone https://github.com/darrenjrobinson/HIBP-MCP-Server.git
  1. Install dependencies:
bash
cd HIBP-MCP-Server
npm install
  1. Build the project:
bash
npm run build
  1. Configure your MCP client with:
json
{
  "mcpServers": {
    "HIBP-MCP": {
      "command": "node",
      "args": ["path/to/hibp-mcp/build/main.js"],
      "env": {
        "HIBP_API_KEY": "<your-hibp-api-key>",
        "HIBP_SUBSCRIPTION_PLAN": "Pwned 1"
      }
    }
  }
}

Environment Variables

NameDescription
HIBP_API_KEYYour Have I Been Pwned API key
HIBP_SUBSCRIPTION_PLANYour HIBP API subscription plan (Pwned 1, Pwned 2, Pwned 3, Pwned 4, or Pwned 5)

Usage Examples

Once configured, you can ask Claude natural language questions about data breaches. Here are some examples:

Checking Email Breaches

Checking Specific Breaches

  • "Tell me about the LinkedIn data breach"
  • "What data was exposed in the Adobe breach?"
  • "List all known data breaches"

Checking Passwords

  • "Has the password 'Password123' been exposed in any breaches?"
  • "Is my password 'MySecurePass2024' safe to use?"
  • "Check if this password has been compromised: 'TestPass1234'"

Checking Pastes

Tools

HIBP-Breaches

Query breached accounts and breaches from the Have I Been Pwned API.

Parameters:

  • operation: The HIBP operation to perform (getAllBreachesForAccount, getAllBreachedSites, getBreachByName, getDataClasses)
  • account: Email address to check for breaches (required for getAllBreachesForAccount)
  • domain: Domain to filter breaches by (optional)
  • name: Breach name to get details for (required for getBreachByName)
  • includeUnverified: Whether to include unverified breaches (optional)
  • truncateResponse: Whether to truncate the response (optional)

HIBP-Pastes

Query pastes containing account data from the Have I Been Pwned API.

Parameters:

  • account: Email address to check for pastes (required)

HIBP-PwnedPasswords

Check if a password has been exposed in data breaches using the Pwned Passwords API.

Parameters:

  • password: Password to check (will be hashed locally before sending and only the first 5 characters sent)

Security Note

Passwords checked through the HIBP-PwnedPasswords tool are never sent in plain text. They are hashed locally using SHA-1, and only the first 5 characters of the hash are sent to the API using k-anonymity.

Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

License

MIT

Author

Darren J Robinson

常见问题

io.github.darrenjrobinson/hibp 是什么?

为 Have I Been Pwned(HIBP)API 提供的 Model Context Protocol(MCP)服务器,用于查询泄露相关信息。

相关 Skills

网页构建器

by anthropics

Universal
热门

面向复杂 claude.ai HTML artifact 开发,快速初始化 React + Tailwind CSS + shadcn/ui 项目并打包为单文件 HTML,适合需要状态管理、路由或多组件交互的页面。

在 claude.ai 里做复杂网页 Artifact 很省心,多组件、状态和路由都能顺手搭起来,React、Tailwind 与 shadcn/ui 组合效率高、成品也更精致。

编码与调试
未扫描114.1k

前端设计

by anthropics

Universal
热门

面向组件、页面、海报和 Web 应用开发,按鲜明视觉方向生成可直接落地的前端代码与高质感 UI,适合做 landing page、Dashboard 或美化现有界面,避开千篇一律的 AI 审美。

想把页面做得既能上线又有设计感,就用前端设计:组件到整站都能产出,难得的是能避开千篇一律的 AI 味。

编码与调试
未扫描114.1k

网页应用测试

by anthropics

Universal
热门

用 Playwright 为本地 Web 应用编写自动化测试,支持启动开发服务器、校验前端交互、排查 UI 异常、抓取截图与浏览器日志,适合调试动态页面和回归验证。

借助 Playwright 一站式验证本地 Web 应用前端功能,调 UI 时还能同步查看日志和截图,定位问题更快。

编码与调试
未扫描114.1k

相关 MCP Server

GitHub

编辑精选

by GitHub

热门

GitHub 是 MCP 官方参考服务器,让 Claude 直接读写你的代码仓库和 Issues。

这个参考服务器解决了开发者想让 AI 安全访问 GitHub 数据的问题,适合需要自动化代码审查或 Issue 管理的团队。但注意它只是参考实现,生产环境得自己加固安全。

编码与调试
83.4k

by Context7

热门

Context7 是实时拉取最新文档和代码示例的智能助手,让你告别过时资料。

它能解决开发者查找文档时信息滞后的问题,特别适合快速上手新库或跟进更新。不过,依赖外部源可能导致偶尔的数据延迟,建议结合官方文档使用。

编码与调试
52.2k

by tldraw

热门

tldraw 是让 AI 助手直接在无限画布上绘图和协作的 MCP 服务器。

这解决了 AI 只能输出文本、无法视觉化协作的痛点——想象让 Claude 帮你画流程图或白板讨论。最适合需要快速原型设计或头脑风暴的开发者。不过,目前它只是个基础连接器,你得自己搭建画布应用才能发挥全部潜力。

编码与调试
46.3k

评论