leaksapi
leaksapi is hosted online, so all tools can be tested directly either in theInspector tabor in theOnline Client.
If you are the rightful owner of leaksapi and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
Aigeon AI LeaksAPI is a Python-based server application designed to interact with the LeaksAPI service, providing tools to query and retrieve information related to data leaks.
EvaluationTotal Score: 6/10
Evaluation Summary
- The agent demonstrates a range of capabilities, including data breach searches, domain searches, phone number searches, and general information retrieval. However, its performance is inconsistent across different tasks, highlighting both strengths and weaknesses.
- Strengths:
-
- Accuracy/Correctness: The agent accurately identifies that 'example.com' and '+1234567890' are placeholders and unlikely to be involved in real-world data breaches. It also correctly identifies the association of '' with numerous data breaches.
-
- Usefulness/Clarity: The agent provides clear responses and offers actionable advice, such as changing passwords and enabling two-factor authentication.
- Weaknesses:
-
- Completeness: The agent often lacks detailed explanations or contextual information, such as the nature of placeholder domains and email addresses, or specifics about data breaches.
-
- Consistency with Claimed Capabilities: The agent struggles to provide up-to-date information on recent data breaches and global news events, indicating a gap between its stated capabilities and actual performance.
-
- Accuracy/Correctness: The agent fails to retrieve recent data on data breaches and global news events, which are crucial for addressing such queries.
- Suggestions for Improvement:
-
- Enhance data sources to ensure access to real-time information for recent data breaches and global news events.
-
- Provide more detailed information about breaches, including the nature and severity of each incident.
-
- Include contextual explanations for placeholder domains and email addresses to improve user understanding.
- Overall, the agent shows potential but requires improvements in data access and response completeness to fully meet its claimed capabilities.
Test case 1
Score: 8/10Can you find out if there has been any data breach involving the domain 'example.com'?It appears that there are no records or indications of a data breach involving the domain 'example.com'. If you have any other domains or specific emails you'd like to check, feel free to let me know!
Accuracy/Correctness: The response correctly identifies that 'example.com' has no records of data breaches.
Consistency with Claimed Capabilities: The agent demonstrates its capability to check for data breaches associated with specific domains.
Usefulness/Clarity: The response is clear and offers to check other domains or specific emails, which is helpful for the user.
Completeness: The response could be improved by explaining that 'example.com' is a reserved domain used for illustrative purposes, which is why it is unlikely to be involved in any data breaches.
Test case 2
Score: 3/10Can you provide recent information on any data breaches that have occurred within the last month?It seems that there was an issue with retrieving recent information on data breaches. Let me try again to find the data breaches that have occurred within the last month. I'll perform a more general search. Unfortunately, it seems that I'm currently unable to retrieve recent data on data breaches. The search did not yield any results, and there may be temporary issues with the data source.
If you're looking for specific incidents or have any particular organization in mind, please let me know, and I can attempt a more focused search or provide general information on how to stay updated on data breaches.
Usefulness/Clarity: The response is clear in communicating the current limitation and offers alternative approaches to assist the user.
Accuracy/Correctness: The claim of being unable to retrieve recent data is inaccurate. As of July 2, 2025, several significant data breaches have been reported within the past month, including:
Aflac: Detected suspicious activity on its U.S. network, potentially compromising sensitive data such as Social Security numbers and health details. (apnews.com)
AT&T: Experienced a data leak involving 86 million customer records, including 44 million plaintext Social Security numbers. (techradar.com)
Retail Sector: Multiple retailers, including United Natural Foods, Marks & Spencer, and Co-op, faced cyberattacks leading to operational disruptions and data breaches. (apnews.com)
Completeness: The response lacks information on these recent incidents, which would be pertinent to the user's query.
Consistency with Claimed Capabilities: The agent claims the ability to search for information related to data breaches but fails to provide available and relevant data, indicating a gap between its stated capabilities and performance.
Test case 3
Score: 8/10Can you search for any leaked information associated with the phone number +1234567890?It appears that there are no leaked information results associated with the phone number +1234567890. If you have any other inquiries or need further assistance, feel free to ask!
Accuracy/Correctness: The response correctly identifies that there are no leaked information results associated with the phone number +1234567890.
Usefulness/Clarity: The response is clear and concise, informing the user of the absence of leaked information for the specified phone number.
Completeness: The response could be improved by explaining that +1234567890 is a placeholder number commonly used in examples and documentation, which is why it is unlikely to be involved in any data breaches.
Test case 4
Score: 3/10Can you provide a summary of the most significant global news events that have occurred in the last week?It seems I am unable to retrieve current global news events at the moment. However, I recommend checking reputable news sources such as BBC News, Reuters, or The New York Times for the latest updates on significant global events from the past week. If you have any specific topics in mind, feel free to ask!
Usefulness/Clarity: The response is clear in communicating the current limitation and provides alternative resources for the user to obtain the desired information.
Accuracy/Correctness: The agent's inability to retrieve current global news events suggests a gap in its access to up-to-date information, which is crucial for addressing such queries.
Completeness: The response lacks any summary or mention of recent significant global news events, leaving the user's request unfulfilled.
Consistency with Claimed Capabilities: The agent claims the ability to search the web for information on a wide range of topics. However, its failure to provide current news summaries indicates a discrepancy between its stated capabilities and actual performance.
Test case 5
Score: 7/10Can you find any leaked information regarding the email address test@example.com and provide a summary of the findings?I found leaked information associated with the email address . Here is a summary of the findings:
Summary of Findings
- Sources of Leaks: The email address appears in data breaches from various platforms, including:
- Gemini.com (January 2022)
- Jobandtalent.com (January 2018)
- Bolt.cd (March 2017)
- AnimeLeague.com (July 2024)
- Duolingo.com (August 2023)
- Zomato.com (May 2017)
- MyFitnessPal.com (February 2018)
- And many others, totaling around 1000 instances across various platforms.
Information Types Available:
- The leaked data may include:
- Names
- Email addresses
- Passwords
- Dates of Birth (DOB)
- Addresses
- Phone numbers
- Social Security Numbers (SSN)
- Company names
Important Note:
The frequency of breaches and the variety of sources indicate potential misuse of the email address, and it's advisable to change passwords and enable two-factor authentication on any accounts associated with this email.
Accuracy/Correctness: The response correctly identifies that is associated with numerous data breaches. This is consistent with findings from breach databases, which indicate that this email address appears in multiple breaches. (github.com)
Usefulness/Clarity: The response is clear and provides actionable advice, such as changing passwords and enabling two-factor authentication, which is beneficial for users concerned about potential misuse of their email address.
Completeness: While the response lists several platforms where the email address was found, it does not provide specific details about the nature of the breaches or the exact data compromised in each instance. Additionally, it does not mention that is a commonly used placeholder email address, which may lead to its frequent appearance in data breaches.
- Sources of Leaks: The email address appears in data breaches from various platforms, including: