Skip to content

antonlindstrom/passpwn

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 

Repository files navigation

passpwn - password breach checker

This is a tool for checking your passwords in pass against Have I been pwned?.

passpwn uses the range API which means that we are only sending the first 5 characters of a SHA1 hashed password to Have I been pwned? and are checking the returned hashes against the full local hash.

Inspiration for this tool comes from the 1Password blog.

A big thanks to haveibeenpwned.com for making this possible in a secure way.

Usage

To only see the compromised passwords:

./passpwn >/dev/null

The program will print compromised passwords to stderr.

With Nix

If you have Nix with flakes enabled, you can run passpwn without installing it:

nix run github:antonlindstrom/passpwn

Or from a local checkout:

nix run .

Without Nix

Copy or symlink the passpwn script to somewhere on your $PATH, for example:

install -m 755 passpwn ~/.local/bin/passpwn

Reporting bugs

If you find any bugs or want to provide feedback, you can file bugs in the project's GitHub Issues page.

Author

This project is maintained by Anton Lindström (GitHub)

License

APACHE LICENSE 2.0 Copyright 2026 Anton Lindström

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

About

See if your passwords in pass has been breached.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors