APIDocumentation
Everything you need to integrate BreachScan into your application signup/login flow: from quick usage to production-ready implementations.
Contents
Getting Started
BreachScan provides privacy-first checks using SHA256 hashes. Your users' credentials never leave your system - only partial hash prefixes are sent to our API.
How Anonymity-Preservation Works
- Hash the credential using SHA-256 on your client
- Send only the first 5 hexadecimal characters of the hash to our API
- Receive all matching hash suffixes for that prefix
- Check locally if any suffix completes your full hash
- A complete match indicates the credential was exposed in known breaches
Privacy benefit: We never see your users' credentials, and all breach confirmation occurs locally.
Authentication
All API requests require an API key passed in the X-API-Key header.
X-API-Key: your-api-key-hereBase URL
https://api.breachscan.aiRate Limits
See your plan limits in the pricing section
Password Endpoint
GET
/check-password/{prefix}Check password hash prefixWhere
{prefix} is the first 5 hex characters of the SHA256 hashEmail Endpoint
GET
/check-email/{prefix}Check email hash prefixWhere
{prefix} is the first 5 hex characters of the SHA256 hashCombo Endpoint
GET
/check-combo/{email_prefix}/{password_prefix}Check email+password combinationWhere
{email_prefix} and {password_prefix} are the first 5 hex characters of each SHA256 hash