aigeon-ai/leaksapi
leaksapi is hosted online, so all tools can be tested directly either in theInspector tabor in theOnline Client.
If you are the rightful owner of leaksapi and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
Aigeon AI LeaksAPI is a Python-based server application designed to interact with the LeaksAPI service, providing tools to query and retrieve information related to data leaks.
Try leaksapi with chat:
Has a README
Github repo has a README.md.
Has a License
Github repo doesn't have a valid license.
Server can be inspected
View server inspector
Server schema can be extracted
Can get at lease one tool info from the README or server.
Online hosted on MCPHub
Can be automatically deployed by MCPHub.
Has social accounts
Do not have any social accounts.
Claimed by the author or certified by MCPHub
If you are the author, claim authorship
AI Evaluation ReportTotal Score: 8/10
The agent demonstrates strong capabilities in identifying whether an email, phone number, or domain has been involved in data breaches. It accurately provides details of breaches, including breach dates, associated usernames, and passwords. For email and domain searches, it shows specific breach instances and common passwords, which are valuable for understanding the extent of exposure. The agent successfully performs domain-wide searches and provides comprehensive breach summaries. However, it lacks the ability to directly communicate breach details in a more structured and human-readable format. Additionally, the agent's responses are somewhat repetitive when asked similar questions, indicating a need for more dynamic answer generation. Overall, the agent is highly effective in breach detection but could improve in presentation and response variety.
Test case 1
Score: 6/10Perform the operation of checking if the email address 'johndoe@example.com' has been involved in any known data breaches where passwords were compromised.The email address johndoe@example.com has been involved in 225 known data breaches where passwords were compromised. Below are some details of the breaches:
- Canva.com
- Breach Date: May 2019
- Username: johndoe905
- Password:
123456
- Zynga.com
- Breach Date: September 2019
- Username: tigerpenisfourhundred
- Password:
123456
- Evony.com
- Breach Date: June 2016
- Password:
123456
- Shein.com
- Breach Date: June 2018
- Password:
123456
- Disqus.com
- Breach Date: July 2012
- Password:
123456
- MySpace.com
- Breach Date: July 2008
- Password:
fake45
- LinkedIn.com
- Breach Date: May 2012
- Password:
johndoe
- Patreon.com
- Breach Date: October 2015
- Name: John Doe
- Trello.com
- Breach Date: January 2024
- Name: John Doe
- Luxottica
- Breach Date: March 2021
- Name: Xie Long The list goes on with numerous instances where the email has been associated with compromised passwords across various platforms. It is highly recommended to change your password for this email and any associated accounts immediately to secure your information.
- Canva.com
Test case 2
Score: 3/10Perform the operation of checking if the phone number '+1-202-555-0173' has been involved in any data breaches.The phone number '+1-202-555-0173' does not appear to have been involved in any data breaches according to the available data.
Test case 3
Score: 9/10Perform the operation of checking if the domain 'example.com' has been involved in any known data breaches.The domain 'example.com' has been involved in several known data breaches. The total number of records found is 1000, with various emails and associated details. Here are some highlights of the breaches:
- Breach Sources:
- xSplit (Breach Date: November 2013)
- VimeWorld.ru (Breach Dates: November 2017, January 2019)
- Collection 1 (Breach Date: January 2019)
- MySpace.com (Breach Date: July 2008)
- Evony.com (Breach Date: June 2016)
- Common Passwords Found:
- "123456"
- "password"
- "qwerty1234" This information indicates that the domain has had multiple instances of data exposure, highlighting the importance of changing passwords and ensuring that unique passwords are used for different sites to minimize risks.
- Breach Sources:
Test case 4
Score: 9/10Perform the operation of checking if the phone number +12125552368 has been involved in any data breaches using the available tools.The phone number +12125552368 has not been involved in any data breaches.
Test case 5
Score: 8/10Perform the operation of checking if the phone number +14155552671 has been involved in any data breaches using the LeaksAPI phone number search functionality.The phone number +14155552671 has not been involved in any data breaches according to the LeaksAPI search results.