A composite indicator derived from automated analysis across six risk categories. Published for transparency -- the framework is open even where individual signal weights remain confidential to protect score integrity.
Version 2.1 -- March 2026Risk bands are calibrated against a representative North American SMB baseline. A score of 0 indicates no detectable external exposure across monitored sources. Scores are point-in-time assessments and will change as new breaches are disclosed, infrastructure is modified, or intelligence feeds are updated.
Each scan produces dozens of discrete observations. Findings are categorized, weighted by demonstrated severity in real-world incidents, and combined into a single 0-100 indicator. Categories below are listed in order of typical contribution -- credential and infrastructure findings carry the most weight because they represent the most direct paths to compromise.
Confirmed presence of domain-linked credentials in breach databases, paste sites, and dark web monitoring. Higher weight reflects that exposed credentials translate to direct account compromise.
Misconfigurations, missing security controls, and exploitable weaknesses on externally visible infrastructure. Findings are weighted by severity, with criticals carrying substantially higher impact than informational notes.
Domain or IP correlation with malware activity, phishing campaigns, abuse reports, and known exploitable vulnerabilities. Each correlation indicates active or recent threat activity rather than theoretical risk.
Shadow IT, leaked credentials in public code, lookalike domains, and unmonitored assets that extend the attack surface beyond what an organization typically tracks.
Government breach notification filings, fraud alert correlations, and consumer protection records that indicate prior incidents or active enforcement attention.
A baseline contribution applied to entities verified in public business registries, ensuring confirmed organizations register a non-zero score that reflects discoverability by threat actors.
Per-signal weight values and source counts are not published. Disclosing exact weights would permit gaming -- adversaries motivated to suppress an organization’s score could optimize against the published values without addressing the underlying exposure. The framework above is sufficient to interpret any score we publish.
Monitors breach databases, dark web repositories, and paste sites for exposed credentials linked to the assessed domain.
Evaluates externally visible infrastructure for misconfigurations, missing security controls, and exploitable weaknesses.
Cross-references domain and IP data against threat intelligence feeds, malware engines, and reputation databases.
Searches federal and state databases for breach notifications, fraud alerts, and corporate registration data.
Analyses historical records to identify changes in infrastructure, ownership, and security posture over time.
Identifies shadow IT, code leaks, and exposure vectors that extend beyond the primary domain.
LeakTrace Intelligence · getleaktrace.com