Home Cyber Security News ‘Have I Been Pwned’ Code Base Goes Open Source

‘Have I Been Pwned’ Code Base Goes Open Source

by Abeerah Hashim

Popular data breach logging website ‘Have I Been Pwned’ has now announced the code base of ‘Have I Been Pwned’ will be open source.

‘Have I Been Pwned’ To Open Source

In a recent post, Troy Hunt has announced that his brainchild Have I Been Pwned will be open source. The announcement comes following a failed merger and acquisition (M&A) attempt ‘Project Svalbard’ that ended beginning this year.

Briefly, the decision is a step towards not only supporting the cybersecurity community but the improvement of HIBP. As he stated,

The philosophy of HIBP has always been to support the community, now I want the community to help support HIBP.

He decided to open-source the codebase to enhance the transparency of HIBP. The move would also raise the security of the product as people will have ‘the nuts and bolts of HIBP’ with them.

The inspiration for this decision came from the plethora of useful open-source projects in the tech world, like Android (OS), WordPress (CMS), Bitwarden (password manager), VLC (media player), and many others that the people highlighted in response to his following tweet.

So, as the code base goes open source, people can get more insights about how HIBP operates, and how it can be improved.

All that backlog, all those bugs, all the great new ideas people have but I simply can’t implement myself can, if the community is willing, finally be contributed back into the project.

What About The Data HIBP Holds?

While the HIBP code base goes public, the step possibly raises questions about the data the site holds.

Troy explained that HIBP primarily relies on the data that is already available to many. That includes both the criminals as well as the many tech firms that rely on HIBP for various purposes. For instance, to identify credential reuse by their customers.

Not to forget mentioning that HIBP API is already available to anyone for checking the breached credentials. Many services like Firefox and GitHub already benefit from HIBP to facilitate their customers.

Nonetheless, Troy Hunt has reiterated the need for keeping the database private and secure.

Regardless of how broadly that information is circling, I still need to ensure the same privacy controls prevail across the breach data itself even as the code base becomes more transparent. That’s non-trivial. Doable, but non-trivial.

The whole process of making the HIBP open source will take time as the owner would proceed gradually (and securely) with the things. So, he hasn’t explicitly mentioned a timeline yet.

Let us know your thoughts in the comments.

You may also like

Latest Hacking News

Privacy Preference Center


The __cfduid cookie is used to identify individual clients behind a shared IP address and apply security settings on a per-client basis.

cookie_notice_accepted and gdpr[allowed_cookies] are used to identify the choices made from the user regarding cookie consent.

For example, if a visitor is in a coffee shop where there may be several infected machines, but the specific visitor's machine is trusted (for example, because they completed a challenge within your Challenge Passage period), the cookie allows Cloudflare to identify that client and not challenge them again. It does not correspond to any user ID in your web application, and does not store any personally identifiable information.

__cfduid, cookie_notice_accepted, gdpr[allowed_cookies]


DoubleClick by Google refers to the DoubleClick Digital Marketing platform which is a separate division within Google. This is Google’s most advanced advertising tools set, which includes five interconnected platform components.

DoubleClick Campaign Manager: the ad-serving platform, called an Ad Server, that delivers ads to your customers and measures all online advertising, even across screens and channels.

DoubleClick Bid Manager – the programmatic bidding platform for bidding on high-quality ad inventory from more than 47 ad marketplaces including Google Display Network.

DoubleClick Ad Exchange: the world’s largest ad marketplace for purchasing display, video, mobile, Search and even Facebook inventory.

DoubleClick Search: is more powerful than AdWords and used for purchasing search ads across Google, Yahoo, and Bing.

DoubleClick Creative Solutions: for designing, delivering and measuring rich media (video) ads, interactive and expandable ads.



The _ga is asssociated with Google Universal Analytics - which is a significant update to Google's more commonly used analytics service. This cookie is used to distinguish unique users by assigning a randomly generated number as a client identifier. It is included in each page request in a site and used to calculate visitor, session and campaign data for the sites analytics reports. By default it is set to expire after 2 years, although this is customisable by website owners.

The _gat global object is used to create and retrieve tracker objects, from which all other methods are invoked. Therefore the methods in this list should be run only off a tracker object created using the _gat global variable. All other methods should be called using the _gaq global object for asynchronous tracking.

_gid works as a user navigates between web pages, they can use the gtag.js tagging library to record information about the page the user has seen (for example, the page's URL) in Google Analytics. The gtag.js tagging library uses HTTP Cookies to "remember" the user's previous interactions with the web pages.

_ga, _gat, _gid