JWTDecode
by BytesAgain
Decode and inspect JWT tokens showing header, payload, and expiry. Use when debugging auth tokens, inspecting claims, checking token expiration.
安装
claude skill add --url github.com/openclaw/skills/tree/main/skills/bytesagain1/jwtdecode文档
JWTDecode
A command-line devtools toolkit for working with JWT tokens. Check, validate, generate, format, lint, explain, convert, diff, preview, fix, and report on JWT data — all from your terminal with persistent logging and activity tracking.
Why JWTDecode?
- Works entirely offline — tokens and data never leave your machine
- No external dependencies or accounts needed
- Every action is timestamped and logged for full auditability
- Export your history to JSON, CSV, or plain text anytime
- Pure bash implementation — lightweight and portable
Commands
| Command | Description |
|---|---|
jwtdecode check <input> | Check a JWT token for issues; view recent checks without args |
jwtdecode validate <input> | Validate JWT token structure and format |
jwtdecode generate <input> | Generate JWT-related data or test tokens |
jwtdecode format <input> | Format JWT token output for readability |
jwtdecode lint <input> | Lint JWT tokens for common problems |
jwtdecode explain <input> | Explain JWT token structure (header, payload, signature) |
jwtdecode convert <input> | Convert JWT data between formats |
jwtdecode template <input> | Create or apply JWT templates |
jwtdecode diff <input> | Diff two JWT tokens to find claim differences |
jwtdecode preview <input> | Preview decoded JWT token output |
jwtdecode fix <input> | Auto-fix common JWT formatting issues |
jwtdecode report <input> | Generate a report from JWT analysis |
jwtdecode stats | Show summary statistics across all actions |
jwtdecode export <fmt> | Export all logs (formats: json, csv, txt) |
jwtdecode search <term> | Search across all log entries |
jwtdecode recent | Show the 20 most recent activity entries |
jwtdecode status | Health check — version, disk usage, entry count |
jwtdecode help | Show help with all available commands |
jwtdecode version | Print current version (v2.0.0) |
Each data command (check, validate, generate, etc.) works in two modes:
- With arguments — logs the input with a timestamp and saves to its dedicated log file
- Without arguments — displays the 20 most recent entries from that command's log
Data Storage
All data is stored locally in ~/.local/share/jwtdecode/. The directory structure:
check.log,validate.log,generate.log, etc. — per-command log fileshistory.log— unified activity log across all commandsexport.json,export.csv,export.txt— generated export files
Set the JWTDECODE_DIR environment variable or modify DATA_DIR in the script to change the storage location.
Requirements
- Bash 4.0+ (uses
set -euo pipefail) - Standard Unix tools:
date,wc,du,tail,grep,sed,cat - Works on Linux and macOS
- No external packages or network access required
When to Use
- Debugging authentication flows — use
jwtdecode checkandjwtdecode explainto inspect token contents when troubleshooting login or API auth issues - Validating token structure — run
jwtdecode validateto verify that tokens conform to expected JWT format before deploying auth changes - Comparing tokens across environments — use
jwtdecode diffto spot claim differences between staging and production tokens - Auditing token usage — use
jwtdecode stats,jwtdecode recent, andjwtdecode exportto review your JWT analysis history over time - Formatting tokens for documentation — run
jwtdecode formatto produce clean, readable token breakdowns for technical docs or code reviews
Examples
# Check a JWT token for issues
jwtdecode check "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."
# Validate a token's structure
jwtdecode validate "eyJhbGciOiJSUzI1NiJ9..."
# Explain what a JWT token contains
jwtdecode explain "eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiIxMjM0NTY3ODkwIn0..."
# View all recent checks (no args = show history)
jwtdecode check
# Export all history as JSON
jwtdecode export json
# Search for a specific claim in logs
jwtdecode search "admin"
# View summary statistics
jwtdecode stats
# Health check
jwtdecode status
Output
All commands output structured text to stdout. You can redirect output to a file:
jwtdecode report mytoken > analysis.txt
jwtdecode export csv
Configuration
The data directory defaults to ~/.local/share/jwtdecode/. Modify the DATA_DIR variable at the top of script.sh to customize the storage path.
Powered by BytesAgain | bytesagain.com | hello@bytesagain.com
相关 Skills
前端设计
by anthropics
面向组件、页面、海报和 Web 应用开发,按鲜明视觉方向生成可直接落地的前端代码与高质感 UI,适合做 landing page、Dashboard 或美化现有界面,避开千篇一律的 AI 审美。
✎ 想把页面做得既能上线又有设计感,就用前端设计:组件到整站都能产出,难得的是能避开千篇一律的 AI 味。
网页构建器
by anthropics
面向复杂 claude.ai HTML artifact 开发,快速初始化 React + Tailwind CSS + shadcn/ui 项目并打包为单文件 HTML,适合需要状态管理、路由或多组件交互的页面。
✎ 在 claude.ai 里做复杂网页 Artifact 很省心,多组件、状态和路由都能顺手搭起来,React、Tailwind 与 shadcn/ui 组合效率高、成品也更精致。
网页应用测试
by anthropics
用 Playwright 为本地 Web 应用编写自动化测试,支持启动开发服务器、校验前端交互、排查 UI 异常、抓取截图与浏览器日志,适合调试动态页面和回归验证。
✎ 借助 Playwright 一站式验证本地 Web 应用前端功能,调 UI 时还能同步查看日志和截图,定位问题更快。
相关 MCP 服务
GitHub
编辑精选by GitHub
GitHub 是 MCP 官方参考服务器,让 Claude 直接读写你的代码仓库和 Issues。
✎ 这个参考服务器解决了开发者想让 AI 安全访问 GitHub 数据的问题,适合需要自动化代码审查或 Issue 管理的团队。但注意它只是参考实现,生产环境得自己加固安全。
Context7 文档查询
编辑精选by Context7
Context7 是实时拉取最新文档和代码示例的智能助手,让你告别过时资料。
✎ 它能解决开发者查找文档时信息滞后的问题,特别适合快速上手新库或跟进更新。不过,依赖外部源可能导致偶尔的数据延迟,建议结合官方文档使用。
by tldraw
tldraw 是让 AI 助手直接在无限画布上绘图和协作的 MCP 服务器。
✎ 这解决了 AI 只能输出文本、无法视觉化协作的痛点——想象让 Claude 帮你画流程图或白板讨论。最适合需要快速原型设计或头脑风暴的开发者。不过,目前它只是个基础连接器,你得自己搭建画布应用才能发挥全部潜力。