A composite indicator derived from automated analysis of 47 intelligence sources across 6 risk categories. Published for transparency -- your score is never a black box.
Version 2.1 -- March 2026Risk bands are calibrated against a baseline of 2,400+ Canadian SMB scans. A score of 0 indicates no detectable external exposure across all monitored sources. Scores are point-in-time assessments and will change as new breaches are disclosed, infrastructure is modified, or intelligence feeds are updated.
| Category | Signal Name | Max Points | Description |
|---|---|---|---|
| Credential | breach_database_hit | 15 | Domain-level match in monitored breach databases |
| Credential | breach_depth_scale | 3 / each | Per additional breach source detected, scaling with exposure breadth |
| Credential | credential_pattern_match | 10 / each | Per confirmed credential pattern across monitored intelligence sources |
| Credential | dark_web_confirmation | 12 / each | Per confirmation in dark web monitoring or paste site databases |
| Infrastructure | critical_vulnerability | 15 / each | Per critical infrastructure vulnerability -- exposed services, critical misconfigurations |
| Infrastructure | high_vulnerability | 8 / each | Per high-severity infrastructure finding detected on exposed surfaces |
| Infrastructure | medium_vulnerability | 4 / each | Per medium-severity infrastructure finding across assessed endpoints |
| Infrastructure | missing_security_control | 3 / each | Per missing security control -- headers, policies, authentication configurations |
| Exposure | shadow_asset_detected | 5 / each | Per unexpected live asset -- shadow IT, forgotten services, orphaned infrastructure |
| Exposure | code_leak_detected | 20 | Credentials or configuration data exposed in public code repositories |
| Threat Intel | known_cve | 18 | Known exploitable vulnerability (CVE) detected on exposed services |
| Threat Intel | reputation_blacklisted | 12 | IP address or domain listed on reputation blacklists and abuse databases |
| Threat Intel | malware_association | 20 | Domain flagged by malware detection engines across threat intelligence feeds |
| Threat Intel | abuse_reports | 15 | Elevated abuse confidence score from aggregated threat intelligence feeds |
| Threat Intel | active_malware_hosting | 20 | Active malware distribution URLs detected on the assessed domain |
| Threat Intel | phishing_association | 18 | Domain associated with known phishing campaigns or typosquatting activity |
| Regulatory | regulatory_breach_report | 15 | Match in government breach notification databases and regulatory filings |
| Regulatory | fraud_alert_association | 12 | Association with government fraud alert databases and consumer protection filings |
| Registry | entity_confirmed | 8 | Corporate identity confirmed in public registries -- provides baseline score for verified entities |
Monitors breach databases, dark web repositories, and paste sites for exposed credentials linked to the assessed domain.
Evaluates externally visible infrastructure for misconfigurations, missing security controls, and exploitable weaknesses.
Cross-references domain and IP data against threat intelligence feeds, malware engines, and reputation databases.
Searches federal and provincial databases for breach notifications, fraud alerts, and corporate registration data.
Analyses historical records to identify changes in infrastructure, ownership, and security posture over time.
Identifies shadow IT, code leaks, and exposure vectors that extend beyond the primary domain.
LeakTrace Intelligence -- getleaktrace.com