How to Use Chrome's Password Checkup to Find Weak or Stolen Passwords
Google Chrome has a built-in password checkup that scans your saved passwords for breaches, weak passwords, and reused passwords — and helps you fix them.
Open Chrome's Password Manager
~15sRun the Password Checkup
~18sQuick Tip
Quick Tip: You may need to re-enter your Google account password to run the checkup. This is for security — it confirms it is really you.
Review the Results
~15sFix Compromised Passwords First
~27sWarning
If a password is listed as compromised, assume the account was potentially accessed by someone else. Change the password and check the account for any suspicious activity (like unknown purchases or setting changes).
Use Strong Suggested Passwords
~15sYou Did It!
You've completed: How to Use Chrome's Password Checkup to Find Weak or Stolen Passwords
Need more help? Get Expert Help from a TekSure Tech
If you save passwords in Google Chrome, the browser keeps a secret eye on them for you. Chrome's Password Checkup feature automatically checks your saved passwords against databases of known data breaches — if one of your passwords was exposed in a hack of a website, Chrome alerts you so you can change it.
The checkup also flags passwords that are too weak (short, common, or easily guessed) and passwords you reuse across multiple sites (a significant security risk because if one account gets hacked, all accounts with that password are vulnerable).
Password Checkup is free and built into Chrome — no extension or subscription needed. It works on computers, Android, and iPhone versions of Chrome.
Running a password checkup takes less than a minute and can reveal serious vulnerabilities you did not know about. It is one of the most useful and underused security tools available to everyday users.
After running the checkup, Chrome gives you direct links to the affected websites so you can go change your password immediately. You do not need to search for the site or remember the URL.
Was this guide helpful?
Your feedback helps us make TekSure better for everyone.
Want to rate with stars?
Still have questions?
Ask TekBrain a follow-up question about this guide. It’s free, no sign-up needed, and the answer will be in plain English.
Official Resources
Sources used to create and verify this guide. View all sources →
← Previous
How to Manage Trusted Devices on Your Apple ID
Next →
How to Set Up and Check Voicemail on an Android Phone
Still stuck? No problem.
Sometimes a guide isn’t enough. Our technicians can walk you through it step by step, in plain English, on your schedule.
Related Guides
More from Safety & Privacy
How to Secure Your Home Wi-Fi Network
Simple steps to lock down your home router, keep strangers off your network, and protect every device in your house.
3 min read
Setting Up Two-Factor Authentication (2FA) on Any Account
Add a second layer of security to your most important accounts. This one change stops most account takeovers cold.
3 min read
Staying Safe on Social Media
How to protect your privacy on Facebook and Instagram, spot fake accounts, and avoid the most common social media traps.
3 min read