APIDocumentation

Everything you need to integrate BreachScan into your application signup/login flow: from quick usage to production-ready implementations.

Contents

Getting Started

BreachScan provides privacy-first checks using SHA256 hashes. Your users' credentials never leave your system - only partial hash prefixes are sent to our API.

How Anonymity-Preservation Works

  1. Hash the credential using SHA-256 on your client
  2. Send only the first 5 hexadecimal characters of the hash to our API
  3. Receive all matching hash suffixes for that prefix
  4. Check locally if any suffix completes your full hash
  5. A complete match indicates the credential was exposed in known breaches

Privacy benefit: We never see your users' credentials, and all breach confirmation occurs locally.

Authentication

All API requests require an API key passed in the X-API-Key header.

X-API-Key: your-api-key-here

Base URL

https://api.breachscan.ai

Rate Limits

See your plan limits in the pricing section

Password Endpoint

GET/check-password/{prefix}Check password hash prefix
Where {prefix} is the first 5 hex characters of the SHA256 hash

Email Endpoint

GET/check-email/{prefix}Check email hash prefix
Where {prefix} is the first 5 hex characters of the SHA256 hash

Combo Endpoint

GET/check-combo/{email_prefix}/{password_prefix}Check email+password combination
Where {email_prefix} and {password_prefix} are the first 5 hex characters of each SHA256 hash