This adapter checks whether your passwords or e-mail addresses have appeared in known data breaches — without ever sending your actual passwords to any server.
- Privacy first – passwords are never transmitted. The SHA-1 hash is computed locally in the browser; only the first 5 characters are sent to the API (k-anonymity)
- Password check – uses the free Have I Been Pwned k-anonymity API — no API key required
- E-mail check – uses the free XposedOrNot API — no API key required
- Breach details – individual data points per breach source under
emails.<id>.leaks.* - ioBroker notifications – sends a system notification when a new breach is detected, in the configured system language (11 languages supported)
- HTML visualisation – generates a ready-to-use HTML data point for use in VIS or other dashboards
- Configurable appearance – theme (light/dark), background transparency, card transparency, font size
- Configurable interval – check every 3, 6, 12 or 24 hours
Install via the ioBroker Admin interface — search for pwned-check.
Add one entry per password you want to monitor. Enter a description (e.g. the service name) and the password. The SHA-1 hash is computed in your browser and stored — the plaintext password is never saved.
| Field | Description |
|---|---|
| Description | A label for this password (e.g. "GitHub") |
| Password | Entered once; only the SHA-1 hash is stored |
Add one entry per e-mail address to monitor.
| Field | Description |
|---|---|
| The e-mail address to check |
| Setting | Description | Default |
|---|---|---|
| Interval | How often to check for new breaches | 24 hours |
| Theme | Light or dark visualisation | Light |
| Background transparency | Outer container opacity (0 = fully transparent) | 100% |
| Card transparency | Individual entry card opacity | 100% |
| Font size | Text size in the visualisation | 14 px |
The adapter creates data points under pwned-check.<instance>.
| Data point | Type | Description |
|---|---|---|
passwords.<id>.isPwned |
boolean | true if found in a breach |
passwords.<id>.leakCount |
number | Number of times found in breach databases |
passwords.<id>.lastCheck |
string | ISO timestamp of last successful check |
| Data point | Type | Description |
|---|---|---|
emails.<id>.isPwned |
boolean | true if found in a breach |
emails.<id>.lastCheck |
string | ISO timestamp of last successful check |
emails.<id>.leaks.<service> |
boolean | true for each breach source found |
| Data point | Type | Description |
|---|---|---|
visualisation |
string | HTML snippet for use in VIS or ioBroker.vis-2 |
info.connection |
boolean | true while a check is running |
- Passwords are never stored in plaintext — only their SHA-1 hash
- Password hashes are checked using the HIBP k-anonymity method: only the first 5 hex characters of the hash are transmitted; the full hash never leaves your system
- E-mail addresses are sent to the XposedOrNot API over HTTPS
- (ipod86) add pawns-cli malware detection (process + /tmp file check)
- (ipod86) new DPs: system.pawns.detected, processRunning, fileFound, processInfo, lastCheck
- (ipod86) widget shows malware warning only when detected, with forum link
- (ipod86) notification on every check if malware active
- (ipod86) setting to enable/disable malware check (default: on)
- (ipod86) fix dark theme in admin UI
- (ipod86) add dark theme support for admin settings UI
- (ipod86) initial release
MIT License
Copyright (c) 2026 ipod86
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
