R/breached_site.R
breached_site.Rd
Get a specific breached site, based in breach name (not domain)
breached_site(name, verbose = TRUE, agent = NULL)
name | Search for a specific named breach |
---|---|
verbose | whether to message about http errors and re-tries |
agent | agent to be used as header in calls, by default "HIBPwned R pkg". # nolint |
Data.frame containing breach details
Note that the package uses memoise
(https://github.com/r-lib/memoise)
with no timeout argument
so that results are cached inside an active R session.
breached_site("Adobe")#> Name Title Domain BreachDate AddedDate ModifiedDate #> 1 Adobe Adobe adobe.com 2013-10-04 2013-12-04T00:00:00Z 2013-12-04T00:00:00Z #> PwnCount #> 1 152445165 #> Description #> 1 In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email, <em>encrypted</em> password and a password hint in plain text. The password cryptography was poorly done and <a href="http://stricture-group.com/files/adobe-top100.txt" target="_blank" rel="noopener">many were quickly resolved back to plain text</a>. The unencrypted hints also <a href="http://www.troyhunt.com/2013/11/adobe-credentials-and-serious.html" target="_blank" rel="noopener">disclosed much about the passwords</a> adding further to the risk that hundreds of millions of Adobe customers already faced. #> LogoPath #> 1 https://haveibeenpwned.com/Content/Images/PwnedLogos/Adobe.png #> DataClasses IsVerified IsFabricated #> 1 Email addresses, Password hints, Passwords, Usernames TRUE FALSE #> IsSensitive IsRetired IsSpamList #> 1 FALSE FALSE FALSE