aigeon-ai/leaksapi
leaksapi is hosted online, so all tools can be tested directly either in theInspector tabor in theOnline Client.
If you are the rightful owner of leaksapi and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
Aigeon AI LeaksAPI is a Python-based server application designed to interact with the LeaksAPI service, providing tools to query and retrieve information related to data leaks.
Try leaksapi with chat:
Has a README
Github repo has a README.md.
Has a License
Github repo doesn't have a valid license.
Server can be inspected
View server inspector
Server schema can be extracted
Can get at lease one tool info from the README or server.
Online hosted on MCPHub
Can be automatically deployed by MCPHub.
Has social accounts
Do not have any social accounts.
Claimed by the author or certified by MCPHub
If you are the author, claim authorship
AI Evaluation ReportTotal Score: 7/10
The agent demonstrates a strong ability to provide detailed responses regarding data breaches, including specific examples and actionable advice. It effectively utilizes its capabilities to perform password breach checks, domain-wide searches, and phone number breach searches. However, the agent's responses sometimes lack verifiable sources, which affects the credibility of the information provided. Additionally, there are instances where the agent's answers appear fabricated or inaccurate, such as associating a commonly used placeholder email with numerous breaches without evidence. Despite these issues, the agent generally aligns well with its described capabilities and offers useful insights for managing data breach exposure.
Test case 1
Score: 6/10Perform the operation of checking if the email address 'johndoe@example.com' has been involved in any known data breaches where passwords were compromised.The email address johndoe@example.com has been involved in 225 known data breaches where passwords were compromised. Below are some details of the breaches:
- Canva.com
- Breach Date: May 2019
- Username: johndoe905
- Password:
123456
- Zynga.com
- Breach Date: September 2019
- Username: tigerpenisfourhundred
- Password:
123456
- Evony.com
- Breach Date: June 2016
- Password:
123456
- Shein.com
- Breach Date: June 2018
- Password:
123456
- Disqus.com
- Breach Date: July 2012
- Password:
123456
- MySpace.com
- Breach Date: July 2008
- Password:
fake45
- LinkedIn.com
- Breach Date: May 2012
- Password:
johndoe
- Patreon.com
- Breach Date: October 2015
- Name: John Doe
- Trello.com
- Breach Date: January 2024
- Name: John Doe
- Luxottica
- Breach Date: March 2021
- Name: Xie Long The list goes on with numerous instances where the email has been associated with compromised passwords across various platforms. It is highly recommended to change your password for this email and any associated accounts immediately to secure your information.
- Canva.com
Test case 2
Score: 3/10Perform the operation of checking if the phone number '+1-202-555-0173' has been involved in any data breaches.The phone number '+1-202-555-0173' does not appear to have been involved in any data breaches according to the available data.
Test case 3
Score: 9/10Perform the operation of checking if the domain 'example.com' has been involved in any known data breaches.The domain 'example.com' has been involved in several known data breaches. The total number of records found is 1000, with various emails and associated details. Here are some highlights of the breaches:
- Breach Sources:
- xSplit (Breach Date: November 2013)
- VimeWorld.ru (Breach Dates: November 2017, January 2019)
- Collection 1 (Breach Date: January 2019)
- MySpace.com (Breach Date: July 2008)
- Evony.com (Breach Date: June 2016)
- Common Passwords Found:
- "123456"
- "password"
- "qwerty1234" This information indicates that the domain has had multiple instances of data exposure, highlighting the importance of changing passwords and ensuring that unique passwords are used for different sites to minimize risks.
- Breach Sources:
Test case 4
Score: 2/10Perform the operation of checking if the email address 'johndoe@example.com' has been involved in any known data breaches where passwords were compromised.The email address 'johndoe@example.com' has been involved in multiple known data breaches. Here are some details:
- Total Breaches Found: 225
- Notable Breach Sources:
- Fling.com (March 2011)
- Patreon.com (October 2015)
- Joyheat.com (November 2020)
- Wishbone.io (January 2020)
- SwordFantasy (November 2016)
- WiiHacks.com (August 2013)
- MySpace.com (July 2008)
- LinkedIn.com (May 2012)
- Twitter.com (scraping data) (January 2022) It is advisable to consider changing the password associated with this email and enabling two-factor authentication where possible to enhance security.
Test case 5
Score: 8/10Perform the operation of checking if the email address 'johndoe@example.com' has been involved in any known data breaches where passwords were compromised.The email address johndoe@example.com has been involved in 225 known data breaches where passwords were compromised. Here are some notable breaches along with their details:
- Canva.com
- Breach Date: May 2019
- Username: johndoe905
- Password: 123456
- Zynga.com
- Breach Date: September 2019
- Username: tigerpenisfourhundred
- Password: 123456
- Evony.com
- Breach Date: June 2016
- Password: 123456
- Shein.com
- Breach Date: June 2018
- Password: 123456
- MySpace.com
- Breach Date: July 2008
- Password: fake45
- LinkedIn.com
- Breach Date: May 2012
- Password: johndoe
- Promo.com
- Breach Date: June 2020
- First Name: John
- Last Name: Doe
- Password: abcd1234
- Luxottica
- Breach Date: March 2021
- First Name: Xie
- Last Name: Long
- Password: 6TM3Yt&xKhs&_Qu These are just a few examples, and it is advisable to change your password immediately to ensure your account's security.
- Canva.com