Skip to content
clusters: prooflayer · edgemarket · edgefinance · synthforge · mediakit · wordmint · webprobe · locale · comppoint
$ man password-strength

/password-strength(1)

agentutility / web-probe / password-strength
PRICE / CALL
$0.02
USDC · base mainnet · scheme: exact
METHOD
POST
CLUSTER
webprobe
CATEGORY
utilities
STATUS
live
NAME
password-strength password strength meter + breach checker
SYNOPSIS
POST https://x402.org/v1/password-strength
     Content-Type: application/json
     X-PAYMENT:    <signed-transferWithAuthorization>

     { ... }
↳ first call → 402 Payment Required. Sign USDCtransferWithAuthorization, retry with theX-PAYMENT header.
DESCRIPTION

Password strength meter + breach checker. Entropy bits, character-class diversity, common-pattern penalties, estimated crack times (online/offline/GPU). Plus Have I Been Pwned k-anonymity breach lookup — full password never leaves the server.

INPUTrequest schema
propertytypedescriptionreq?
passwordstringPassword to score. Sent over TLS to the worker but never logged. Max 200 chars.required
check_breachesbooleanCheck HIBP. Default true. Sends only first 5 chars of SHA-1 (k-anonymity).optional
OUTPUTresponse shape
fieldtypedescription
scorenumberOverall password strength score, typically 0-100 combining entropy, length, and pattern penalties.
bucketstringStrength label like very-weak, weak, fair, strong, or very-strong derived from the score.
lengthnumberCharacter count of the submitted password.
entropy_bitsnumberShannon entropy estimate in bits based on charset size and length.
charset_sizenumberSize of the effective character pool used for entropy math (e.g., 26, 62, 95).
character_classesobjectPer-class flags showing which sets appear: lowercase, uppercase, digits, symbols.
character_class_countnumberNumber of distinct character classes present (0-4).
common_patterns_foundarrayList of detected weak patterns like dictionary words, sequences, keyboard walks, or dates.
estimated_crack_timeobjectCrack-time estimates for online, offline, and GPU attack scenarios as human-readable durations.
breach_countnumberNumber of times the password appears in the Have I Been Pwned corpus.
is_breachedbooleanTrue when breach_count is greater than zero in the HIBP dataset.
breach_check_performedbooleanTrue when the HIBP k-anonymity lookup ran successfully for this request.
feedbackarrayActionable suggestions to strengthen the password, such as add length or mix character classes.
notestringServer-side note about scoring caveats, HIBP fallback, or privacy guarantee that the password never leaves.
EXAMPLEStwo ways to call
EXAMPLE 1 · curl
curl -X POST https://x402.org/v1/password-strength \
  -H 'Content-Type: application/json' \
  -d '{ }'
first response = 402 Payment Required with payment requirements; sign + retry with X-PAYMENT.
EXAMPLE 2 · mcp
# install once
claude mcp add x402 --command "npx x402-deployer-mcp"

# then ask Claude Code:
# "use the password-strength tool to ..."
MCP server handles payment automatically — your coding agent just calls the tool by name.
METADATA
tags
passwordsecurityentropyhibpbreach
methods
POST
cluster
webprobe
price
$0.02 USDC per call
ADJACENTother endpoints in webprobe
endpointdescriptionprice
archive-snapshotWayback Machine API / archive.org wrapper.$0.02
dmarc-checkDMARC / SPF / DKIM checker.$0.02
dns-lookupDNS lookup / DNS resolver / DoH proxy.$0.02
expand-urlURL expander / redirect chain tracer / link-shortener resolver.$0.02
whoisDomain WHOIS / RDAP lookup.$0.02
whois-lookupWHOIS / RDAP domain lookup.$0.02
arxiv-searcharXiv full-text search.$0.03
ssl-certSSL certificate inspector / TLS cert checker / certificate transparency lookup / ssl expiry.$0.03
SEE ALSO
agentutility(7) · webprobe(7) · x402(7) · mcp(7) · llms.txt · registry.json · bazaar.x402.org