Overview
Update the status of one or more leaks to track remediation progress. You can mark leaks asfixed when credentials have been changed or open if they need attention.
Authentication & Authorization
Access Control
- Personal leaks: Always accessible if the leak belongs to your email
- Employee/Customer leaks: Requires domain verification for the associated domain
- Bulk operations: All specified leaks must be accessible to your account
Privacy-First Validation
The API validates leak ownership before allowing status updates to ensure users can only modify leaks they have access to.Request Body
You can update a single leak or multiple leaks in one request:Single Leak Update
Multiple Leaks Update
Status Values
| Status | Description |
|---|---|
open | Leak requires attention - credentials may still be compromised |
fixed | Leak has been remediated - credentials have been changed/secured |
Response Examples
Successful Update
Bulk Update Success
Error Responses
Invalid Request Body
Access Denied
Leak Not Found
Validation Rules
Required Fields
- Either
leakid(single) ORleakids(multiple) must be provided statusfield is required and must be either"open"or"fixed"
Leak ID Format
- Must be 32-character MD5 hash (e.g.,
b3652f2555841f7652badd9804859f4e) - Invalid format will result in a 400 error
Ownership Validation
- API validates that you have access to each leak before updating
- Unauthorized leaks will result in a 403 error
Usage Examples
Mark single leak as fixed
Mark multiple leaks as fixed
Reopen a previously fixed leak
Best Practices
Remediation Workflow
- Identify leaks using the main leaks endpoint
- Get detailed info using the leak info endpoint
- Change credentials on the affected service
- Mark as fixed using this status endpoint
- Monitor for new leaks regularly
Bulk Operations
- Use bulk updates when fixing multiple related leaks
- Validate all leak IDs before making bulk requests
- Handle partial failures gracefully in bulk operations
Status Management
- Mark leaks as
fixedonly after confirming credential changes - Use
openstatus to flag leaks that need immediate attention - Regularly audit fixed leaks to ensure they remain secure
Error Handling
- Implement retry logic for transient failures
- Log access denied errors for security monitoring
- Validate leak ID format before making requests
Authorizations
Body
application/json