-
Is this normal? or Rate limits of the API?
```
[⚡] ACCOUNT CHECKS THAT ENCOUNTERED ERROR:
* @gmail.com: Hibp::HttpClient::ClientError: GET to https://haveibeenpwned.com/api/breachedaccount/%4…
-
Since HIBP moved an API and subscription-based model the gOSINT module is not working properly. Working on a workaround ASAP
Nhoya updated
4 years ago
-
Will you bee upgrading this to the [V3 API](https://haveibeenpwned.com/API/v3)?
There should be a way to specify the `hibp-api-key`.
-
The HIBP API is now V3 and the malsub module needs to be updated
Documentation: https://haveibeenpwned.com/API/v3
-
Hi,
I'm maintainer of [dragonbe/hibp](https://packagist.org/packages/dragonbe/hibp), a composer package to validate passwords against the [Have I been pwned?](https://www.haveibeenpwned.com) API se…
-
Current output from `nextjs` branch is:
> Found 57 errors in 8 files.
>
> Errors Files
> - 2 src/app/functions/server/getBreaches.ts:14
> - 1 src/appConstants.js:60
> - 1 src/db/knexfi…
-
When sending a request to the HIBP API to get a breach or a list of breaches, the API returns a response documented here: https://haveibeenpwned.com/API/v3
We need to create a class that models that…
-
Currently, the tool is a bit flaky since a file can be on the CDN (post PR merge), but the image asset is not yet on the production site until a new server deploy, so the tool reports this as a 404, d…
-
## Description
Sub-task of issue #13553
Depends on #13611
The breach data comes from the [JSON API endpoint at HIBP](https://haveibeenpwned.com/api/v3/breaches).
The breach icons are fetched …
-
A lot of the "security" rt tickets have to do with compromised passwords. These are almost definitely from a credential stuffing attack, which can actually be somewhat mitigated by disallowing known-c…