magentron / laravel-password-exposed-validation-rule
Laravel validation rule that checks if a password has been exposed in a data breach (forked from dilneiss/laravel-password-exposed-validation-rule)
4.1
2025-09-09 10:53 UTC
Requires
- php: ^7.4||^8.0
- illuminate/contracts: ^5.1||^6.0||^7.0||^8.0||^9.0||^10.0||^11.0|^12.0
- magentron/password_exposed: ^3.2.2
- symfony/cache: ^7.3.2
Requires (Dev)
- php-coveralls/php-coveralls: ^2.0
- phpunit/phpunit: ^9
- vimeo/psalm: ^4
README
(forked from dilneiss/laravel-password-exposed-validation-rule)
🔒 Laravel Password Exposed Validation Rule
This package provides a Laravel validation rule that checks if a password has been exposed in a data breach. It uses the haveibeenpwned.com passwords API via the magentron/password_exposed
library.
Installation
To install, just run the following Composer command.
composer require magentron/laravel-password-exposed-validation-rule
Please note that this package requires Laravel 5.1 or above.
Usage
The following code snippet shows an example of how to use the password exposed validation rule.
use DivineOmega\LaravelPasswordExposedValidationRule\PasswordExposed; $request->validate([ 'password' => ['required', new PasswordExposed()], ]);
If you wish, you can also set a custom validation message, as shown below.
use DivineOmega\LaravelPasswordExposedValidationRule\PasswordExposed; $request->validate([ 'password' => ['required', (new PasswordExposed())->setMessage('This password is not secure.')], ]);