Agents@Work - See AI agents in production at Canva, Autodesk, KPMG, and Lightspeed.
Agents@Work - See AI agents in production at Canva, Autodesk, KPMG, and Lightspeed.
Integrations

Supercharge Have I Been Pwned with Relevance AI

Have I Been Pwned is a trusted service that helps users check if their personal information has been compromised in data breaches.

Enhance your security monitoring with AI Agents that automatically detect and respond to potential data breaches.

Give your AI Agents Have I Been Pwned Superpowers

Have I Been Pwned provides critical data breach intelligence. Relevance AI transforms this into proactive security measures with AI Agents that can monitor, alert, and respond to potential security threats automatically.

Proactive Threat Detection

The agent continuously monitors for compromised credentials, enabling swift action.

Automated Breach Notifications

Instant alerts keep users informed about potential security risks without manual checks.

Enhanced Data Security

The agent orchestrates timely password changes, reducing the risk of unauthorized access.

Tools

Equip AI Agents with the Have I Been Pwned Tools they need

Relevance AI gives you access to Have I Been Pwned's breach detection capabilities within your automated workflows.

have-i-been-pwned - Compress PDF
A tool for compressing PDF files by providing a URL to the source PDF and specifying the output filename, helping reduce file sizes while maintaining document quality
have-i-been-pwned - Read Barcode
A utility for extracting and interpreting barcode data from images by processing an image URL containing QR codes or other barcode formats
have-i-been-pwned - Read Barcode
A utility for extracting and interpreting barcode data from images by processing an image URL containing QR codes or other barcode formats
Name
have-i-been-pwned API Call
Description
Make an authorized request to a have-i-been-pwned API
Parameters
["OAuth Authentication", "Multiple HTTP Methods (GET, POST, PUT, DELETE, PATCH)", "Custom Headers", "Request Body Support", "Response Status Tracking"]
Use Case
A software development team uses have-i-been-pwned API Call to automate their deployment process by making authenticated API requests to trigger builds and updates across their infrastructure. This integration streamlines their CI/CD pipeline by enabling secure, programmatic access to their development resources.

Security & Reliability

The integration uses secure OAuth authentication to safely access Have I Been Pwned's breach data API. Relevance AI manages all API operations in the background while handling rate limits and data validation—letting you focus on analyzing security breaches without worrying about technical implementation.

Built-in error handling and response formatting ensure consistent data delivery, even when dealing with large breach datasets.

No training on your data

Your data remains private and is never utilized for model training purposes.

Security first

We never store anything we don’t need to. The inputs or outputs of your tools are never stored.

Get Started

Best Practices for Non-Technical Users

To get the most out of the Have I Been Pwned + Relevance AI integration without writing code:
  • Use secure authentication: Ensure your API key is properly configured and stored securely.
  • Structure your queries: Format email addresses correctly and use batch requests when checking multiple addresses.
  • Monitor rate limits: Respect the API's rate limiting to avoid service interruptions.
  • Handle responses properly: Account for both breach notifications and "not found" responses in your workflow.
  • Implement error handling: Set up proper error handling for API timeouts and connection issues.