Python client for the XposedOrNot API - Check for data breaches and exposed credentials
Project description
XposedOrNot Python Client
A Python client for the XposedOrNot API to check for data breaches and exposed credentials.
Installation
pip install xposedornot
Quick Start
Free API (No API Key Required)
from xposedornot import XposedOrNot
# Initialize the client
xon = XposedOrNot()
# Check if an email has been exposed (returns breach names only)
result = xon.check_email("test@example.com")
print(f"Found in {len(result.breaches)} breaches: {result.breaches}")
# Get detailed breach analytics
analytics = xon.breach_analytics("test@example.com")
print(f"Total exposures: {analytics.exposures_count}")
print(f"First breach: {analytics.first_breach}")
for breach in analytics.breaches_details:
print(f" - {breach.breach}: {breach.xposed_records} records")
# Get all known breaches
breaches = xon.get_breaches()
print(f"Total breaches in database: {len(breaches)}")
# Filter breaches by domain
adobe_breaches = xon.get_breaches(domain="adobe.com")
# Check if a password has been exposed
# SECURE: Password is hashed locally, only partial hash sent to API
pwd_result = xon.check_password("password123")
print(f"Password exposed {pwd_result.count} times")
xonPlus API (API Key Required)
For commercial use with higher rate limits and detailed breach information, get an API key from console.xposedornot.com.
from xposedornot import XposedOrNot
# Initialize with API key - automatically uses Plus API for email checks
xon = XposedOrNot(api_key="your-api-key")
# Check email - returns detailed breach information
result = xon.check_email("test@example.com")
print(f"Status: {result.status}")
print(f"Email: {result.email}")
for breach in result.breaches:
print(f" - {breach.breach_id}")
print(f" Domain: {breach.domain}")
print(f" Records: {breach.xposed_records}")
print(f" Risk: {breach.password_risk}")
print(f" Data exposed: {breach.xposed_data}")
Features
- Email Breach Check: Check if an email has been exposed in known data breaches
- xonPlus Integration: Commercial API with detailed breach info and higher rate limits
- Breach Analytics: Get detailed analytics including metrics by industry, risk level, and year
- Breach Database: Access the full database of known breaches with filtering
- Secure Password Check: Check passwords without exposing them - uses k-anonymity (password is hashed locally, only partial hash sent)
- Type Hints: Full type annotations for IDE support
API Reference
XposedOrNot Client
from xposedornot import XposedOrNot
# Basic initialization (free API)
xon = XposedOrNot()
# With API key (Plus API - higher rate limits, detailed responses)
xon = XposedOrNot(
api_key="your-api-key", # From console.xposedornot.com
timeout=30.0, # Request timeout in seconds
)
# Use as context manager
with XposedOrNot() as xon:
result = xon.check_email("test@example.com")
Rate Limits:
- Free API (no key): Client enforces 1 request/second, plus the API has hourly/daily caps
- Plus API (with key): No client-side throttling - server enforces your tier limit (50-5000 RPM depending on plan)
- Auto-retry: On 429 errors, the client automatically retries up to 3 times with exponential backoff (1s, 2s, 4s)
- Commercial plans at plus.xposedornot.com/products/api
Methods
check_email(email: str) -> EmailBreachResponse | EmailBreachDetailedResponse
Check if an email has been exposed in data breaches.
- Without API key: Uses free API, returns
EmailBreachResponsewith breach names only - With API key: Uses Plus API (
plus-api.xposedornot.com), returnsEmailBreachDetailedResponsewith full breach details
# Free API (no key)
xon = XposedOrNot()
result = xon.check_email("test@example.com")
print(result.breaches) # ['Adobe', 'LinkedIn', ...]
# Plus API (with key)
xon = XposedOrNot(api_key="your-key")
result = xon.check_email("test@example.com")
print(result.breaches[0].breach_id) # 'Adobe'
print(result.breaches[0].xposed_records) # 152000000
breach_analytics(email: str) -> BreachAnalyticsResponse
Get detailed breach analytics for an email.
analytics = xon.breach_analytics("test@example.com")
print(analytics.exposures_count) # Total exposures
print(analytics.breaches_count) # Number of breaches
print(analytics.first_breach) # Date of first breach
print(analytics.breaches_details) # List of BreachDetails
print(analytics.metrics) # BreachMetrics with industry, risk, etc.
get_breaches(domain: str = None) -> list[Breach]
Get all known breaches, optionally filtered by domain.
# All breaches
all_breaches = xon.get_breaches()
# Filter by domain
adobe = xon.get_breaches(domain="adobe.com")
check_password(password: str) -> PasswordCheckResponse
Check if a password has been exposed in data breaches.
SECURITY: Your password is NEVER sent over the network. This method uses k-anonymity protection:
- The password is hashed locally using Keccak-512
- Only the first 10 characters of the hash are sent to the API
- The API returns matches for that hash prefix
- Your actual password never leaves your machine
# Your password is safe - only a partial hash is sent, never the password itself
result = xon.check_password("mypassword")
print(result.count) # Times this password was found in breaches
print(result.characteristics) # Password traits (length, digits, etc.)
Error Handling
from xposedornot import (
XposedOrNot,
NotFoundError,
RateLimitError,
ValidationError,
)
xon = XposedOrNot()
try:
result = xon.check_email("test@example.com")
except NotFoundError:
print("Email not found in any breaches")
except RateLimitError:
print("Rate limit exceeded, please wait")
except ValidationError as e:
print(f"Invalid input: {e}")
Response Models
All responses are typed dataclasses:
EmailBreachResponse- Contains list of breach names (free API)EmailBreachDetailedResponse- Detailed breach info with metadata (Plus API)BreachInfo- Individual breach details from Plus API (breach_id, domain, password_risk, etc.)BreachAnalyticsResponse- Detailed analytics with metricsBreachDetails- Individual breach information from analytics endpointBreachMetrics- Analytics breakdownBreach- Breach database entryPasswordCheckResponse- Password exposure data
Links
License
MIT License
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file xposedornot-1.0.1.tar.gz.
File metadata
- Download URL: xposedornot-1.0.1.tar.gz
- Upload date:
- Size: 10.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
37533e5d7106ca3a224ec5918808134dca10d5cd8f72496e092a200c09931a04
|
|
| MD5 |
b8e3c921eb1fdd5d871820d57c95e0bd
|
|
| BLAKE2b-256 |
db492d4ce2b88e326f16709883076e208dc07e65f70a1017a1d09fff7bef8f2f
|
File details
Details for the file xposedornot-1.0.1-py3-none-any.whl.
File metadata
- Download URL: xposedornot-1.0.1-py3-none-any.whl
- Upload date:
- Size: 14.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
b410dbf7363fa34b18fdbeac7525089661f849b5967a6bb39b871395a118f869
|
|
| MD5 |
016cdf13566544f744e984d2a0ee959b
|
|
| BLAKE2b-256 |
0daf57b0d190c4ee4564673a45c2ea0c0fc591a1c2f343d2457352343789b053
|