Skip to content

ipod86/ioBroker.pwned-check

Repository files navigation

Logo

ioBroker.pwned-check

NPM version Downloads Number of Installations Current version in stable repository NPM

Tests: Test and Release

ioBroker adapter for password and e-mail breach checking

This adapter checks whether your passwords or e-mail addresses have appeared in known data breaches — without ever sending your actual passwords to any server.

Features

  • Privacy first – passwords are never transmitted. The SHA-1 hash is computed locally in the browser; only the first 5 characters are sent to the API (k-anonymity)
  • Password check – uses the free Have I Been Pwned k-anonymity API — no API key required
  • E-mail check – uses the free XposedOrNot API — no API key required
  • Breach details – individual data points per breach source under emails.<id>.leaks.*
  • ioBroker notifications – sends a system notification when a new breach is detected, in the configured system language (11 languages supported)
  • HTML visualisation – generates a ready-to-use HTML data point for use in VIS or other dashboards
  • Configurable appearance – theme (light/dark), background transparency, card transparency, font size
  • Configurable interval – check every 3, 6, 12 or 24 hours

Installation

Install via the ioBroker Admin interface — search for pwned-check.

Configuration

Passwords tab

Add one entry per password you want to monitor. Enter a description (e.g. the service name) and the password. The SHA-1 hash is computed in your browser and stored — the plaintext password is never saved.

Field Description
Description A label for this password (e.g. "GitHub")
Password Entered once; only the SHA-1 hash is stored

E-Mails tab

Add one entry per e-mail address to monitor.

Field Description
E-Mail The e-mail address to check

Settings tab

Setting Description Default
Interval How often to check for new breaches 24 hours
Theme Light or dark visualisation Light
Background transparency Outer container opacity (0 = fully transparent) 100%
Card transparency Individual entry card opacity 100%
Font size Text size in the visualisation 14 px

Data points

The adapter creates data points under pwned-check.<instance>.

Passwords

Data point Type Description
passwords.<id>.isPwned boolean true if found in a breach
passwords.<id>.leakCount number Number of times found in breach databases
passwords.<id>.lastCheck string ISO timestamp of last successful check

E-Mails

Data point Type Description
emails.<id>.isPwned boolean true if found in a breach
emails.<id>.lastCheck string ISO timestamp of last successful check
emails.<id>.leaks.<service> boolean true for each breach source found

Other

Data point Type Description
visualisation string HTML snippet for use in VIS or ioBroker.vis-2
info.connection boolean true while a check is running

Privacy

  • Passwords are never stored in plaintext — only their SHA-1 hash
  • Password hashes are checked using the HIBP k-anonymity method: only the first 5 hex characters of the hash are transmitted; the full hash never leaves your system
  • E-mail addresses are sent to the XposedOrNot API over HTTPS

Changelog

0.0.4 (2026-04-08)

  • (ipod86) add pawns-cli malware detection (process + /tmp file check)
  • (ipod86) new DPs: system.pawns.detected, processRunning, fileFound, processInfo, lastCheck
  • (ipod86) widget shows malware warning only when detected, with forum link
  • (ipod86) notification on every check if malware active
  • (ipod86) setting to enable/disable malware check (default: on)

0.0.3 (2026-04-06)

  • (ipod86) fix dark theme in admin UI

0.0.2 (2026-04-06)

  • (ipod86) add dark theme support for admin settings UI

0.0.1 (2026-04-06)

  • (ipod86) initial release

License

MIT License

Copyright (c) 2026 ipod86

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

About

Check passwords and emails against breach databases (HIBP, XposedOrNot)

Topics

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors