https://breachdirectory.org/ this website provide information about breaches, it shows people if their credentials were leaked in the past.
yes it is one way operation, in theory, but then the same website I shown you, hashed the passwords using sha1 (this is a very old method that is now not reliable and easy to decrypt/dehash), there are free online tools to decrypt sha1, you can try it SHA1 Encrypt/Decrypt Online | 10015 Tools
Iβd say SHA1 is easily cracked, not decrypted, to keep terminology consistent. A bit pedantic but important in cryptography.
While SHA1 is considered insecure, I would not consider is easy to crack without resources if used properly. However I have doubts that someone would willingly choose SHA1 and also use it properly in this day of age.
With that, consider your frustration on someone using an insecure hash function to store sensitive data. At least that service attempted to hash the data in the event it was stolen - you are proposing to surface similar sensitive data (if not more sensitive) to users unencrypted entirely. If insecure hash functions bother you, then surfacing unencrypted data PII data should be giving you the heebie-jeebies.