Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Extend App with additional "modes" (api endpoints) #11

Open
sinloft opened this issue Aug 24, 2023 · 4 comments
Open

Extend App with additional "modes" (api endpoints) #11

sinloft opened this issue Aug 24, 2023 · 4 comments

Comments

@sinloft
Copy link

sinloft commented Aug 24, 2023

Hi Harun,

it would be great if you could modify the app to include additional endpoints.
I would be intrested in this one:
GET https://haveibeenpwned.com/api/v3/breacheddomain/{domain}
I understand, that it requires an Api key which might make it less valuable/interesting for a lot of users. But the https://haveibeenpwned.com/api/v3/breaches endpoint does not return any result if a breach was not against your company, but some company empoyees had accounts with their email in the breach.

Regards
Chris

@hRun
Copy link
Owner

hRun commented Aug 24, 2023

hi chris,

this sounds like a really good extension to the app indeed, no matter if key guarded or not. i currently have some time at hand and might be able to implement thi as early as next week. i'll keep you posted and have a look at some of the other endpoints as well.

cheers,
harun

@sinloft
Copy link
Author

sinloft commented Aug 25, 2023 via email

@hRun
Copy link
Owner

hRun commented Sep 8, 2023

i pushed a version with the rudimentary implemented functionality "mode=monitored" to a new "develop" branch. as i myself don't own a domain with breached mail addresses, i could only simulate tests not do them with real data. would be happy if you could have a shot at testing and let me know about any issues and suggestions.

right now the command only pulls what is returned by the one endpoint directly, mail aliases and breach names. we could enrich that data with more info on the breaches (e.g. which personal info was breached) by doing some subsequent api calls. let me know if you think that would be meaningful.

the documentation on limitations of requests to the relevant api endpoints is a bit vague, but i already encountered them. i'll try to figure out how to improve the code in that regard, but we might have to accept that the command can be used only sparsely.

@sinloft
Copy link
Author

sinloft commented Sep 25, 2023 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants