Shannon entropy + pattern heuristics + Have-I-Been-Pwned breach check via k-anonymity. Runs entirely in your browser — nothing leaves the client.
Type below — computed live in your browser
Cryptographically secure via SubtleCrypto
Only the first 5 hex chars of SHA-1 ever leave your device
Production API endpoint: POST /api/v1/analyze with check_breaches:true. Full spec in GitHub README.