MCP Tool · Validation

cred_leak_confirm

Passively checks whether emails associated with an asset appear in known breach datasets (HIBP v3). No passwords are retrieved or replayed — read-only breach metadata only.

Input

NameTypeRequiredDescription
asset_idstringyesUUID of the asset whose associated email addresses will be checked.

REST API

curl -H "Authorization: Bearer sic_..." \
  -H "Content-Type: application/json" \
  -X POST https://sicenter.io/api/tools/cred_leak_confirm \
  -d '{"asset_id":"<string>"}'

MCP server

# MCP — call from Claude Desktop, Cursor, or any MCP client
{
  "jsonrpc": "2.0",
  "id": 1,
  "method": "tools/call",
  "params": {
    "name": "cred_leak_confirm",
    "arguments": {
        "asset_id": "<string>"
    }
  }
}

Endpoint: https://sicenter.io/api/mcp. See /mcp for connection guides for Claude Desktop, Cursor, and custom orchestrators.

More tools in Validation


Browse the full MCP server documentation or jump to the API key management page in your dashboard.