A privacy-first CLI tool for checking whether a password has appeared in known data breaches using Troy Hunt's Pwned Passwords API and the k-anonymity model.
Passchek securely checks passwords against the Have I Been Pwned Pwned Passwords API without ever sending the full password, or even the full SHA-1 hash, over the network.
The project is intentionally designed so that users can quickly audit the full source code themselves. Since real passwords and user trust are involved, the implementation follows strict engineering principles:
-
Conciseness The code stays as short as possible while preserving readability. No unnecessary layers, abstractions, or dead code.
-
Clarity A novice Python developer should be able to understand the whole program in under a minute. The structure is intentionally simple, PEP 8 compliant, and self-explanatory.
-
Leanness Every function, import, and constant must justify its existence. Anything non-essential is removed.
-
Embeddability The core breach-check logic is trivially reusable as a small importable function for CI/CD, scripts, web backends, or other automation.
-
Professional suitability The codebase follows production-grade engineering expectations: clear control flow, minimal side effects, strong typing, predictable behavior, robust error handling, and idiomatic Python.
-
Security Password exposure risk is minimized through hidden prompt input, reduced plaintext copies, no logging, no unnecessary I/O, local suffix matching, and careful hashing flow.
-
Independence Passchek uses only the Python standard library and targets Python 3.9+.
-
Speed Response parsing uses early exits, minimal allocations, efficient iteration, and reduced memory copies for the fastest possible standard-library implementation.
These principles make it easy for users to personally verify that the application behaves safely.
- Secure password breach checks using the k-anonymity protocol
- Check single or multiple passwords
- Read passwords from stdin and shell pipes
- Numeric-only output for scripting
- SHA-1 prefix/suffix output without network access
- Fast early-exit response parsing
- Python 3.9 through 3.14 support
- Modern PyPI package installation
- Zero third-party runtime dependencies
-
Hash the password with SHA-1
-
Split the hash into:
- first 5 characters as prefix
- remaining 35 characters as suffix
-
Send only the prefix to the API
-
Compare suffixes locally
-
Return the breach count
The full password never leaves the local machine.
python3 -m pip install --upgrade passchekOr for the current user only:
python3 -m pip install --user passchekpasschek --versionExpected output:
Passchek v0.2.3git clone https://github.com/edyatl/passchek.git
cd passchek
python3 -m pip install .Note: pip search is no longer supported by PyPI. Use pip show passchek or passchek --version instead.
Usage:
passchek [options] [PASSWORD ...]
Arguments:
PASSWORD One or more passwords to check.
If omitted, Passchek reads from prompt or stdin.
Options:
-h, --help Show help and exit
-n, --num-only Output only breach count numbers
-p, --pipe Read passwords from stdin / shell pipe
-s, --sha1 Print SHA-1 hash as prefix/suffix and exit
-v, --version Show Passchek version
$ passchek
Enter password:
This password has appeared 3912816 times in data breaches.$ passchek -n
Enter password:
3912816$ passchek -s
Enter password:
('B1B37', '73A05C0ED0176787A4F1574FF0075F7521E')$ passchek -n qwerty ytrewq qazwsx random_password
3912816
33338
505344
0$ cat passwords.txt | passchek -np
21
8
0
0
457The safest way to use Passchek is interactive prompt mode:
passchekThis avoids shell history leakage and keeps input hidden.
Avoid passing real passwords as command-line arguments:
passchek my-secret-passwordShell history may store plaintext values.
Prefer:
- interactive prompt
- stdin pipe
- secret injection from secure automation environments
Install Python 3.9+ from:
https://www.python.org/downloads/windows/
Then install:
py -m pip install passchekRun:
passchekA major refactoring and modernization release focused on maintainability, packaging, typing, and Python 3.14 readiness.
- Python 3.9+ built-in generics support
- package-style versioning via
passchek._version.__version__ - improved MANIFEST and PyPI packaging flow
- better CLI version and help formatting
- comprehensive type hints in source and tests
- linter, formatter, and pre-commit configuration
- refactored
main()into smaller focused units - replaced legacy URL helpers with
_APIconstant and f-strings - optimized response parsing with
splitlines()andpartition() - early exit on first suffix match
- modernized packaging from
setup.pytopyproject.toml - improved SHA-1 handling with
usedforsecurity=True
- corrected password whitespace stripping
- improved pipe newline handling
- better empty-password test behavior
- more robust urllib error handling
- consistent non-zero CLI exit codes
Contributions are welcome.
Areas especially appreciated:
- security review
- performance review
- code simplification
- packaging improvements
- test coverage
Repository:
https://github.com/edyatl/passchek
Thanks to Troy Hunt for the Pwned Passwords API.
Thanks to James Ridgway for the original shell-script inspiration.
Yevgeny Dyatlov
GitHub: https://github.com/edyatl
MIT License
Copyright (c) 2020-2026 Yevgeny Dyatlov
See LICENSE for details.