Server data from the Official MCP Registry
A Model Context Protocol (MCP) server for the Have I Been Pwned (HIBP) API
A Model Context Protocol (MCP) server for the Have I Been Pwned (HIBP) API
Set these up before or after installing:
Environment variable: HIBP_API_KEY
Environment variable: HIBP_SUBSCRIPTION_PLAN
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-darrenjrobinson-hibp": {
"env": {
"HIBP_API_KEY": "your-hibp-api-key-here",
"HIBP_SUBSCRIPTION_PLAN": "your-hibp-subscription-plan-here"
},
"args": [
"-y",
"@darrenjrobinson/hibp-mcp"
],
"command": "npx"
}
}
}This HIBP MCP server is well-designed with proper authentication, good security practices, and appropriate permissions for its purpose. The server requires API keys, implements rate limiting, uses secure password hashing with k-anonymity, and has clean error handling throughout. Supply chain analysis found 2 known vulnerabilities in dependencies (0 critical, 2 high severity). Package verification found 1 issue.
Scanned 7 files · 6 findings
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Be the first to review this server!