{"id":2557,"date":"2026-04-17T00:06:06","date_gmt":"2026-04-17T00:06:06","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/"},"modified":"2026-04-17T00:06:06","modified_gmt":"2026-04-17T00:06:06","slug":"heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/","title":{"rendered":"Here&#8217;s What Agentic AI Can Do With Have I Been Pwned&#8217;s APIs"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/0c034da7-4e9c-4369-87f4-aa7c60adef5d.jpg\" alt=\"Here's What Agentic AI Can Do With Have I Been Pwned's APIs\"><\/p>\n<p>I love cutting-edge tech, but I hate hyperbole, so I find AI to be a real paradox. Somewhere in that whole mess of overnight influencers, disinformation and ludicrous claims is some real &#8220;gold&#8221; &#8211; AI stuff that&#8217;s genuinely useful and makes a meaningful difference. This blog post cuts straight to the good stuff, specifically how you can use AI with Have I Been Pwned to do some pretty cool things.  I&#8217;ll be showing examples based on OpenClaw running on the Mac Mini in the hero shot, but they&#8217;re applicable to other agents that turn HIBP&#8217;s data into more insightful analysis.<\/p>\n<p>So, let me talk about what you can do right now, what we&#8217;re working on and what you&#8217;ll be able to do in the future.<\/p>\n<h2 id=\"model-context-protocol-mcp\">Model Context Protocol (MCP)<\/h2>\n<p>A quick MCP primer first: Anthropic came up with the idea of building a protocol that could connect systems to AI apps, and thus the <a href=\"https:\/\/modelcontextprotocol.io\/?ref=troyhunt.com\" rel=\"noreferrer\">Model Context Protocol<\/a> was born:<\/p>\n<blockquote><p>Using MCP, AI applications like Claude or ChatGPT can connect to data sources (e.g. local files, databases), tools (e.g. search engines, calculators) and workflows (e.g. specialized prompts)\u2014enabling them to access key information and perform tasks.<\/p><\/blockquote>\n<p>If I&#8217;m honest, I&#8217;m a bit on the fence as to how useful this really is (<a href=\"https:\/\/risky.biz\/RBFEATURES7\/?ref=troyhunt.com\" rel=\"noreferrer\">and I&#8217;m not alone<\/a>), but creating it was a no-brainer, so we now have an MCP server for HIBP:<\/p>\n<p><!--kg-card-begin: html--><\/p>\n<pre><code>https:\/\/haveibeenpwned.com\/mcp<\/code><\/pre>\n<p><!--kg-card-end: html--><\/p>\n<p>You can&#8217;t just make an HTTP GET to the endpoint, but you can ask your favourite AI tool to explain what it does:<\/p>\n<figure class=\"kg-card kg-image-card kg-width-full\"><img decoding=\"async\" src=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image.png\" class=\"kg-image\" alt=\"Here's What Agentic AI Can Do With Have I Been Pwned's APIs\" loading=\"lazy\" width=\"788\" height=\"630\" srcset=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/size\/w600\/2026\/04\/image.png 600w, https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image.png 788w\"><\/figure>\n<p>In other words, all the stuff we describe in <a href=\"https:\/\/haveibeenpwned.com\/API\/v3?ref=troyhunt.com\" rel=\"noreferrer\">the API docs<\/a> \ud83d\ude42 That&#8217;s an overly simplistic statement, and there are many nuances MCP introduces beyond a computer reading docs intended for humans, but the point is that we&#8217;ve implemented MCP and it&#8217;s there if you want it. Which means you can easily use the JSON below to, for example, <a href=\"https:\/\/docs.github.com\/en\/copilot\/how-tos\/provide-context\/use-mcp-in-your-ide\/extend-copilot-chat-with-mcp?ref=troyhunt.com\" rel=\"noreferrer\">extend GitHub Copilot<\/a>:<\/p>\n<p><!--kg-card-begin: html--><\/p>\n<pre><code>\"HIBP\": {\n  \"url\": \"https:\/\/haveibeenpwned.com\/mcp\",\n  \"headers\": {\n    \"hibp-api-key\": \"YOUR_STANDARD_HIBP_API_KEY\"\n  },\n  \"type\": \"http\"\n}<\/code><\/pre>\n<p><!--kg-card-end: html--><\/p>\n<p>Now let&#8217;s do something useful with it.<\/p>\n<h2 id=\"human-use-cases\">Human Use Cases<\/h2>\n<p>This is really the point of the whole thing &#8211; how can humans use it to do genuinely useful stuff? In particular, how can they use it to do stuff that was hard to do before, and how can &#8220;normies&#8221; (non-technical folks) use it to do stuff they previously needed developers for? I&#8217;ve been toying with these questions for a while now. Here&#8217;s what I&#8217;ve come up with:<\/p>\n<p>Firstly, I&#8217;m going to do all these demos on OpenClaw. I&#8217;ve been talking a lot about that on my weekly live streams over the past month, and the &#8220;agentic&#8221; nature of it (being able to act as an independent agent tying together multiple otherwise independent acts) is <em>enormously<\/em> powerful. Every company worth its AI salt is now focusing on building out agentic AI so whilst I&#8217;m using OpenClaw for these demos, you&#8217;ll be able to do exactly the same thing in your platform of choice either now or in the very near future.<\/p>\n<p>I&#8217;m using a Telegram bot as my interface into OpenClaw, let&#8217;s kick it off:<\/p>\n<figure class=\"kg-card kg-image-card\"><img decoding=\"async\" src=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image-1.png\" class=\"kg-image\" alt=\"Here's What Agentic AI Can Do With Have I Been Pwned's APIs\" loading=\"lazy\" width=\"488\" height=\"515\"><\/figure>\n<p>Easy, right? \ud83d\ude42 There&#8217;s a different discussion around how secrets are stored and protected, but that&#8217;s a story for another time (and is also obviously dependent on your agent). But the key is easily rotated on the HIBP dashboard anyway. If you don&#8217;t have a key already, <a href=\"https:\/\/haveibeenpwned.com\/Subscription?ref=troyhunt.com\" rel=\"noreferrer\">go and take out a subscription<\/a> (they start at a few bucks a month), and you&#8217;ll be up and running in no time.<\/p>\n<p>Now that I know I&#8217;m connected, let&#8217;s learn about how I&#8217;m presently using the service:<\/p>\n<figure class=\"kg-card kg-image-card\"><img decoding=\"async\" src=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image-2.png\" class=\"kg-image\" alt=\"Here's What Agentic AI Can Do With Have I Been Pwned's APIs\" loading=\"lazy\" width=\"635\" height=\"366\" srcset=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/size\/w600\/2026\/04\/image-2.png 600w, https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image-2.png 635w\"><\/figure>\n<p>Most of these are pretty obvious, but I&#8217;ve also included another here that I use to monitor how the service is behaving with a large organisation. It&#8217;s a real domain with real data, so I&#8217;m going to obfuscate it to preserve privacy, but it&#8217;s a great demonstration of how useful AI is. In fact, the inspiration of this blog post was when I received this notification last week:<\/p>\n<figure class=\"kg-card kg-image-card\"><img decoding=\"async\" src=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image-3.png\" class=\"kg-image\" alt=\"Here's What Agentic AI Can Do With Have I Been Pwned's APIs\" loading=\"lazy\" width=\"623\" height=\"852\" srcset=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/size\/w600\/2026\/04\/image-3.png 600w, https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image-3.png 623w\"><\/figure>\n<p>One of the most asked questions after someone in a large org receives an email like this is &#8220;who are those 16 people in the breach&#8221;? Because we can&#8217;t reliably filter large domains in the UI, I&#8217;d normally suggest they either download the CSV or JSON format in the dashboard, then search for &#8220;Hallmark&#8221; in there or use the API and write some code. But now, there&#8217;s a much easier way:<\/p>\n<figure class=\"kg-card kg-image-card\"><img decoding=\"async\" src=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image-4.png\" class=\"kg-image\" alt=\"Here's What Agentic AI Can Do With Have I Been Pwned's APIs\" loading=\"lazy\" width=\"485\" height=\"474\"><\/figure>\n<p>Well that was easy \ud83d\ude0e I like the additional context too, and now it has me curious: what have these people been up to?<\/p>\n<figure class=\"kg-card kg-image-card\"><img decoding=\"async\" src=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image-5.png\" class=\"kg-image\" alt=\"Here's What Agentic AI Can Do With Have I Been Pwned's APIs\" loading=\"lazy\" width=\"491\" height=\"396\"><\/figure>\n<p>Because I&#8217;m on a Pro plan (or if you&#8217;re still on the old Pwned 5 plan), I&#8217;ve also got access to stealer logs. Let&#8217;s see what&#8217;s going on there:<\/p>\n<figure class=\"kg-card kg-image-card\"><img decoding=\"async\" src=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image-6.png\" class=\"kg-image\" alt=\"Here's What Agentic AI Can Do With Have I Been Pwned's APIs\" loading=\"lazy\" width=\"486\" height=\"331\"><\/figure>\n<p>If you were running an online service, that first number would indicate compromised customers. But as OpenClaw has suggested here, the second number is the one that&#8217;s interesting in terms of employees entering their data into other websites using the corporate email address. But they&#8217;d <em>never <\/em>reuse the same password as the work one, right? \ud83e\udd14 Best check which services they&#8217;re entering organisational assets into:<\/p>\n<figure class=\"kg-card kg-image-card\"><img decoding=\"async\" src=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image-15.png\" class=\"kg-image\" alt=\"Here's What Agentic AI Can Do With Have I Been Pwned's APIs\" loading=\"lazy\" width=\"488\" height=\"601\"><\/figure>\n<p>The first one makes sense and is extra worrying when you consider these are people infected with infostealers. That&#8217;s not necessarily malware on a corporate asset; they could always be using an infected personal device to sign into a corporate asset&#8230; ok, that&#8217;s also pretty bad! I was a bit surprised to see Steam in there TBH &#8211; who&#8217;s using their corporate email address to sign into a gaming platform?! A quiet chat with them might be in order. And the bamboozled.net stuff is weird, I want to understand a bit more about that:<\/p>\n<figure class=\"kg-card kg-image-card\"><img decoding=\"async\" src=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image-10.png\" class=\"kg-image\" alt=\"Here's What Agentic AI Can Do With Have I Been Pwned's APIs\" loading=\"lazy\" width=\"484\" height=\"389\"><\/figure>\n<p>Now I&#8217;m losing interest in this blog post and am <em>really <\/em>curious as to what&#8217;s actually in the data!<\/p>\n<figure class=\"kg-card kg-image-card\"><img decoding=\"async\" src=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image-9.png\" class=\"kg-image\" alt=\"Here's What Agentic AI Can Do With Have I Been Pwned's APIs\" loading=\"lazy\" width=\"491\" height=\"433\"><\/figure>\n<p>Ok, so there&#8217;s an entire rabbit hole over there! Let&#8217;s park that, but think about how useful information like this is to infosec teams when you can pull it so easily. Or how useful info like this is to HR teams \ud83d\ude2c<\/p>\n<figure class=\"kg-card kg-image-card\"><img decoding=\"async\" src=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image-11.png\" class=\"kg-image\" alt=\"Here's What Agentic AI Can Do With Have I Been Pwned's APIs\" loading=\"lazy\" width=\"490\" height=\"744\"><\/figure>\n<p>Keep in mind, these are corporate addresses tied to the company and <a href=\"https:\/\/www.troyhunt.com\/your-work-email-address-is-your-works-email-address\/\" rel=\"noreferrer\">are the company&#8217;s property<\/a>, so, yeah&#8230;<\/p>\n<p>But remember the agentic nature of OpenClaw means we can ask it to go off and run tasks in the background, tasks like this:<\/p>\n<figure class=\"kg-card kg-image-card\"><img decoding=\"async\" src=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image-12.png\" class=\"kg-image\" alt=\"Here's What Agentic AI Can Do With Have I Been Pwned's APIs\" loading=\"lazy\" width=\"489\" height=\"145\"><\/figure>\n<p>This was just a little thought experiment I set up a few days ago and forgot about until yesterday, when I loaded a new breach:<\/p>\n<figure class=\"kg-card kg-image-card\"><img decoding=\"async\" src=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image-13.png\" class=\"kg-image\" alt=\"Here's What Agentic AI Can Do With Have I Been Pwned's APIs\" loading=\"lazy\" width=\"441\" height=\"434\"><\/figure>\n<p>I never asked it to look for &#8220;functional\/system accounts&#8221;; it just decided that was relevant. And it is &#8211; this breach clearly had a lot of data in it related to purchases of services, which is an interesting aspect.<\/p>\n<p>The idea of running stuff on a schedule opens up a whole raft of new opportunities. For example, monitoring your family&#8217;s email addresses: &#8220;let me know when mum@example.com appears in a new breach&#8221;. From here, your creativity is the only limit (and even that statement is debatable, given how much stuff AI agents come up with on their own). For example, creating visualisations of the data:<\/p>\n<figure class=\"kg-card kg-image-card kg-width-full\"><img decoding=\"async\" src=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image-14.png\" class=\"kg-image\" alt=\"Here's What Agentic AI Can Do With Have I Been Pwned's APIs\" loading=\"lazy\" width=\"1937\" height=\"881\" srcset=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/size\/w600\/2026\/04\/image-14.png 600w, https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/size\/w1000\/2026\/04\/image-14.png 1000w, https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/size\/w1600\/2026\/04\/image-14.png 1600w, https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/image-14.png 1937w\"><\/figure>\n<p>I could go on and on (I started going down another rabbit hole of having it generate executive-level reports with all the data), but you get the idea.<\/p>\n<h2 id=\"the-ai-pipeline\">The AI Pipeline<\/h2>\n<p>This is about what&#8217;s in <em>our <\/em>pipeline, and the primary theme is putting tooling where it&#8217;s more easily accessible to the masses. Creating a connector in Claude, an app in ChatGPT, and similar plumbing in the other big players&#8217; AI tools is an obvious next step. This will likely involve adding an OAuth layer to HIBP, allowing end users to configure the respective tools to query those HIBP APIs under their identity and achieve the same results as above, but built into the &#8220;traditional&#8221; AI tooling in a way people are familiar with.<\/p>\n<h2 id=\"future\">Future<\/h2>\n<p>A big part of this is about AI enabling more human conversations to achieve technical outcomes. I spotted this from Cloudflare just yesterday, and it&#8217;s a perfect example of just this:<\/p>\n<p><!--kg-card-begin: html--><\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Cloudflare dashboard can now complete tasks for you.<\/p>\n<p>&#8211; &#8220;Create a Worker and bind a new R2 bucket to it&#8221;<br \/>&#8211; &#8220;Change my DNS records to 1.1.1.1&#8221;<br \/>&#8211; &#8220;How many errors have happened this week&#8221;<\/p>\n<p>Not only do we tell you, but we show you with generative UI.<\/p>\n<p>PROTIP: Use full-screen mode. <a href=\"https:\/\/t.co\/Q1o1vyoOwk?ref=troyhunt.com\">pic.twitter.com\/Q1o1vyoOwk<\/a><\/p>\n<p>\u2014 Brayden (@BraydenWilmoth) <a href=\"https:\/\/twitter.com\/BraydenWilmoth\/status\/2044422996765352226?ref_src=twsrc%5Etfw&amp;ref=troyhunt.com\">April 15, 2026<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<!--kg-card-end: html--><\/p>\n<p>I&#8217;ve been pretty blown away by both how easy this process has been and how much insight I&#8217;ve been able to draw from data I&#8217;ve been sitting on for ages. We&#8217;ll be building out more tooling and easily reproducible demos in the future, and I&#8217;m sure a lot of that will do stuff we haven&#8217;t even thought of yet. If you give this a go and find other awesome use cases, please leave a comment and tell me what you&#8217;ve done, especially if you&#8217;ve cut through the hyperbole and created some genuinely awesome stuff \ud83d\ude0e<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>I love cutting-edge tech, but I hate hyperbole, so I find AI to be a real paradox. Somewhere in that whole mess of overnight influencers, disinformation and ludicrous claims is some real &#8220;gold&#8221; &#8211; AI stuff that&#8217;s genuinely useful and makes a meaningful difference. This blog post cuts straight to the good stuff, specifically how [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[90,267],"tags":[91],"class_list":["post-2557","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-have-i-been-pwned","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Here&#039;s What Agentic AI Can Do With Have I Been Pwned&#039;s APIs - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Here&#039;s What Agentic AI Can Do With Have I Been Pwned&#039;s APIs - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"I love cutting-edge tech, but I hate hyperbole, so I find AI to be a real paradox. Somewhere in that whole mess of overnight influencers, disinformation and ludicrous claims is some real &#8220;gold&#8221; &#8211; AI stuff that&#8217;s genuinely useful and makes a meaningful difference. This blog post cuts straight to the good stuff, specifically how [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-17T00:06:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/0c034da7-4e9c-4369-87f4-aa7c60adef5d.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Here&#8217;s What Agentic AI Can Do With Have I Been Pwned&#8217;s APIs\",\"datePublished\":\"2026-04-17T00:06:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/\"},\"wordCount\":1559,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/0c034da7-4e9c-4369-87f4-aa7c60adef5d.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\",\"Have I Been Pwned\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/\",\"name\":\"Here's What Agentic AI Can Do With Have I Been Pwned's APIs - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/0c034da7-4e9c-4369-87f4-aa7c60adef5d.jpg\",\"datePublished\":\"2026-04-17T00:06:06+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/#primaryimage\",\"url\":\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/0c034da7-4e9c-4369-87f4-aa7c60adef5d.jpg\",\"contentUrl\":\"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/0c034da7-4e9c-4369-87f4-aa7c60adef5d.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Here&#8217;s What Agentic AI Can Do With Have I Been Pwned&#8217;s APIs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Here's What Agentic AI Can Do With Have I Been Pwned's APIs - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/","og_locale":"en_US","og_type":"article","og_title":"Here's What Agentic AI Can Do With Have I Been Pwned's APIs - Imperative Business Ventures Limited","og_description":"I love cutting-edge tech, but I hate hyperbole, so I find AI to be a real paradox. Somewhere in that whole mess of overnight influencers, disinformation and ludicrous claims is some real &#8220;gold&#8221; &#8211; AI stuff that&#8217;s genuinely useful and makes a meaningful difference. This blog post cuts straight to the good stuff, specifically how [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-04-17T00:06:06+00:00","og_image":[{"url":"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/0c034da7-4e9c-4369-87f4-aa7c60adef5d.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Here&#8217;s What Agentic AI Can Do With Have I Been Pwned&#8217;s APIs","datePublished":"2026-04-17T00:06:06+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/"},"wordCount":1559,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/#primaryimage"},"thumbnailUrl":"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/0c034da7-4e9c-4369-87f4-aa7c60adef5d.jpg","keywords":["Cybersecurity"],"articleSection":["Cybersecurity","Have I Been Pwned"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/","name":"Here's What Agentic AI Can Do With Have I Been Pwned's APIs - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/#primaryimage"},"thumbnailUrl":"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/0c034da7-4e9c-4369-87f4-aa7c60adef5d.jpg","datePublished":"2026-04-17T00:06:06+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/#primaryimage","url":"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/0c034da7-4e9c-4369-87f4-aa7c60adef5d.jpg","contentUrl":"https:\/\/storage.ghost.io\/c\/fb\/33\/fb3391dc-723d-4e74-b95a-d641b5feb38e\/content\/images\/2026\/04\/0c034da7-4e9c-4369-87f4-aa7c60adef5d.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/04\/17\/heres-what-agentic-ai-can-do-with-have-i-been-pwneds-apis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Here&#8217;s What Agentic AI Can Do With Have I Been Pwned&#8217;s APIs"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=2557"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2557\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=2557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=2557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=2557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}