Exposure report

Phase 2 Test User

A stranger can connect too many dots too easily.

Low visibility Moderate linkage risk High clue density Critical exposure
Submitted
#2
Scan ID
Status
completed_stub
Pipeline state
Evidence cards
0
Captured data points
Action plan
5
Recommended tasks
Exposure score
98
Critical Exposure
Pipeline progress

Scan progress

Open ops

Your scan has completed. The visuals below summarize what was found and why it matters.

0 queued 0 running 0 completed 0 failed
High severity
2
Major identity risks
Medium severity
3
Linkage risks
Surface count
5
Distinct exposure surfaces
Collectors
0
Analysis engines used
What this means
Why you stand out online

High exposure potential. Your identifiers create multiple paths for correlation.

email linkage cross-platform identity correlation direct contact exposure location confirmation business-personal linkage
Most exposed surfaces
email username phone location domain
Collector yield
Which engines found evidence

No collector output yet.

Exposure footprint
How the trail connects
You
Phase 2 Test User
Location clue
Kuala Lumpur, Malaysia
Email trail
1 submitted email
Username trail
2 submitted usernames
Domain clue
phase2-example.com
This is a visual footprint of how submitted identifiers and discovered evidence sources can cluster together. It is not yet a true geo map; it is a correlation map.
Evidence sources
Where the strongest signals showed up

No evidence domains captured yet.

How an outsider could reason
What someone could infer
  • Someone could pivot from one username to multiple accounts and build a broader identity profile.
  • A phone number can make it easier to connect listings, messaging accounts, and business records.
  • Location clues can be combined with names, usernames, and employer data to narrow identity matches.
  • A domain can act as a hub that links projects, social accounts, emails, and public bios.
Adversary playbook
How the dots get connected
  • Start from a reused username and search across platforms.
  • Use public email traces to connect accounts and contact points.
  • Use a phone number to reinforce identity matches and targeting.
  • Use location clues to confirm which profiles likely belong to you.
  • Use the domain to connect business activity, profiles, and contact details.
Initial findings
What the scan found
  • Email addresses may be publicly searchable
    medium · email_exposure · confidence: high
    1 email(s) could be tied to profiles, breaches, contact pages, and cached search results.
  • Username reuse makes cross-platform correlation easier
    high · username_reuse · confidence: high
    2 username(s) can be checked across social platforms, forums, marketplaces, and old accounts.
  • Phone numbers increase discoverability and scam targeting risk
    high · phone_exposure · confidence: high
    1 phone number(s) can strengthen account lookup, contact tracing, and broker-style matching.
  • Location data strengthens identity confidence
    medium · location_linkage · confidence: medium
    City and country data can validate that scattered profiles belong to the same person.
  • Domains can connect business and personal identity trails
    medium · domain_association · confidence: medium
    The submitted domain (phase2-example.com) may connect websites, profiles, contact points, and project history.
Priority actions
What to do first
  • Separate public and private email usage
    high priority
    Use different emails for public-facing profiles, logins, and personal communication.
  • Reduce username reuse
    high priority
    Change or compartmentalize usernames so one handle does not connect all of your identities.
  • Remove public phone exposure where possible
    high priority
    Remove phone numbers from public profiles, business listings, and searchable pages when not required.
  • Reduce unnecessary location disclosure
    medium priority
    Remove city, neighborhood, and other location references from public bios when they are not needed.
  • Review domain-linked identity leakage
    medium priority
    Check whether your domain, email, and profile links unintentionally connect business and personal accounts.
Collector detail
How each engine contributed

No collector runs yet.

Evidence gallery
Captured public signals

No evidence cards yet.

Submitted identifiers
What you gave the scan
Full name
Phase 2 Test User
Emails
phase2@example.com
Usernames
phase2user, oldphase2handle
Phone numbers
+60111111111
City
Kuala Lumpur
Country
Malaysia
Domain
phase2-example.com
Lifecycle
When the pipeline ran
State
unknown
Submitted
n/a
Queued
n/a
Running
n/a
Assembled
n/a
Completed
n/a
Raw job pipeline
Collector job states

No jobs yet.