APIDocumentation
Everything you need to integrate BreachScan into your application signup/login flow: from quick usage to production-ready implementations.
Contents
Getting Started
BreachScan provides privacy-first checks using SHA256 hashes. Your users' credentials never leave your system - only partial hash prefixes are sent to our API.
How Anonymity-Preservation Works
- Hash the credential using SHA-256 on your client
- Send only the first 5 hexadecimal characters of the hash to our API
- Receive all matching hash suffixes for that prefix
- Check locally if any suffix completes your full hash
- A complete match indicates the credential was exposed in known breaches
Privacy benefit: We never see your users' credentials, and all breach confirmation occurs locally.
Authentication
All API requests require an API key passed in the X-API-Key
header.
X-API-Key: your-api-key-here
Base URL
https://api.breachscan.ai
Rate Limits
See your plan limits in the pricing section
Password Endpoint
GET
/check-password/{prefix}
Check password hash prefixWhere
{prefix}
is the first 5 hex characters of the SHA256 hashEmail Endpoint
GET
/check-email/{prefix}
Check email hash prefixWhere
{prefix}
is the first 5 hex characters of the SHA256 hashCombo Endpoint
GET
/check-combo/{email_prefix}/{password_prefix}
Check email+password combinationWhere
{email_prefix}
and {password_prefix}
are the first 5 hex characters of each SHA256 hash