leaksapi

aigeon-ai/leaksapi

4.6

leaksapi is hosted online, so all tools can be tested directly either in theInspector tabor in theOnline Client.

If you are the rightful owner of leaksapi and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.

Aigeon AI LeaksAPI is a Python-based server application designed to interact with the LeaksAPI service, providing tools to query and retrieve information related to data leaks.

Try leaksapi with chat:

MCPHub score:4.6

Has a README

Github repo has a README.md.

Has a License

Github repo doesn't have a valid license.

Server can be inspected

View server inspector

Server schema can be extracted

Can get at lease one tool info from the README or server.

Online hosted on MCPHub

Can be automatically deployed by MCPHub.

Has social accounts

Do not have any social accounts.

Claimed by the author or certified by MCPHub

If you are the author, claim authorship

AI Evaluation Report
Total Score: 8/10

The agent demonstrates strong capabilities in identifying whether an email, phone number, or domain has been involved in data breaches. It accurately provides details of breaches, including breach dates, associated usernames, and passwords. For email and domain searches, it shows specific breach instances and common passwords, which are valuable for understanding the extent of exposure. The agent successfully performs domain-wide searches and provides comprehensive breach summaries. However, it lacks the ability to directly communicate breach details in a more structured and human-readable format. Additionally, the agent's responses are somewhat repetitive when asked similar questions, indicating a need for more dynamic answer generation. Overall, the agent is highly effective in breach detection but could improve in presentation and response variety.

  • Test case 1
    Score: 6/10
    Perform the operation of checking if the email address 'johndoe@example.com' has been involved in any known data breaches where passwords were compromised.

    The email address johndoe@example.com has been involved in 225 known data breaches where passwords were compromised. Below are some details of the breaches:

    1. Canva.com
      • Breach Date: May 2019
      • Username: johndoe905
      • Password: 123456
    2. Zynga.com
      • Breach Date: September 2019
      • Username: tigerpenisfourhundred
      • Password: 123456
    3. Evony.com
      • Breach Date: June 2016
      • Password: 123456
    4. Shein.com
      • Breach Date: June 2018
      • Password: 123456
    5. Disqus.com
      • Breach Date: July 2012
      • Password: 123456
    6. MySpace.com
      • Breach Date: July 2008
      • Password: fake45
    7. LinkedIn.com
      • Breach Date: May 2012
      • Password: johndoe
    8. Patreon.com
      • Breach Date: October 2015
      • Name: John Doe
    9. Trello.com
      • Breach Date: January 2024
      • Name: John Doe
    10. Luxottica
      • Breach Date: March 2021
      • Name: Xie Long The list goes on with numerous instances where the email has been associated with compromised passwords across various platforms. It is highly recommended to change your password for this email and any associated accounts immediately to secure your information.
  • Test case 2
    Score: 3/10
    Perform the operation of checking if the phone number '+1-202-555-0173' has been involved in any data breaches.

    The phone number '+1-202-555-0173' does not appear to have been involved in any data breaches according to the available data.

  • Test case 3
    Score: 9/10
    Perform the operation of checking if the domain 'example.com' has been involved in any known data breaches.

    The domain 'example.com' has been involved in several known data breaches. The total number of records found is 1000, with various emails and associated details. Here are some highlights of the breaches:

    • Breach Sources:
      • xSplit (Breach Date: November 2013)
      • VimeWorld.ru (Breach Dates: November 2017, January 2019)
      • Collection 1 (Breach Date: January 2019)
      • MySpace.com (Breach Date: July 2008)
      • Evony.com (Breach Date: June 2016)
    • Common Passwords Found:
      • "123456"
      • "password"
      • "qwerty1234" This information indicates that the domain has had multiple instances of data exposure, highlighting the importance of changing passwords and ensuring that unique passwords are used for different sites to minimize risks.
  • Test case 4
    Score: 9/10
    Perform the operation of checking if the phone number +12125552368 has been involved in any data breaches using the available tools.

    The phone number +12125552368 has not been involved in any data breaches.

  • Test case 5
    Score: 8/10
    Perform the operation of checking if the phone number +14155552671 has been involved in any data breaches using the LeaksAPI phone number search functionality.

    The phone number +14155552671 has not been involved in any data breaches according to the LeaksAPI search results.