Have I Been Pwned is a trusted service that helps users check if their personal information has been compromised in data breaches.
Enhance your security monitoring with AI Agents that automatically detect and respond to potential data breaches.



Have I Been Pwned provides critical data breach intelligence. Relevance AI transforms this into proactive security measures with AI Agents that can monitor, alert, and respond to potential security threats automatically.
Proactive Threat Detection
The agent continuously monitors for compromised credentials, enabling swift action.
Automated Breach Notifications
Instant alerts keep users informed about potential security risks without manual checks.
Enhanced Data Security
The agent orchestrates timely password changes, reducing the risk of unauthorized access.
Relevance AI gives you access to Have I Been Pwned's breach detection capabilities within your automated workflows.
What you’ll need
You don't need to be a developer to set up this integration. Follow this simple guide to get started:
- A Have I Been Pwned account
- A Relevance AI account with access to your API key
- Authorization (you'll connect securely using OAuth—no sensitive info stored manually)
Security & Reliability
The integration uses secure OAuth authentication to safely access Have I Been Pwned's breach data API. Relevance AI manages all API operations in the background while handling rate limits and data validation—letting you focus on analyzing security breaches without worrying about technical implementation.
Built-in error handling and response formatting ensure consistent data delivery, even when dealing with large breach datasets.
No training on your data
Your data remains private and is never utilized for model training purposes.
Security first
We never store anything we don’t need to. The inputs or outputs of your tools are never stored.

Best Practices for Non-Technical Users
To get the most out of the Have I Been Pwned + Relevance AI integration without writing code:
- Use secure authentication: Ensure your API key is properly configured and stored securely.
- Structure your queries: Format email addresses correctly and use batch requests when checking multiple addresses.
- Monitor rate limits: Respect the API's rate limiting to avoid service interruptions.
- Handle responses properly: Account for both breach notifications and "not found" responses in your workflow.
- Implement error handling: Set up proper error handling for API timeouts and connection issues.