JWTDecode

by BytesAgain

Decode and inspect JWT tokens showing header, payload, and expiry. Use when debugging auth tokens, inspecting claims, checking token expiration.

3.7k编码与调试未扫描2026年3月23日

安装

claude skill add --url github.com/openclaw/skills/tree/main/skills/bytesagain1/jwtdecode

文档

JWTDecode

A command-line devtools toolkit for working with JWT tokens. Check, validate, generate, format, lint, explain, convert, diff, preview, fix, and report on JWT data — all from your terminal with persistent logging and activity tracking.

Why JWTDecode?

  • Works entirely offline — tokens and data never leave your machine
  • No external dependencies or accounts needed
  • Every action is timestamped and logged for full auditability
  • Export your history to JSON, CSV, or plain text anytime
  • Pure bash implementation — lightweight and portable

Commands

CommandDescription
jwtdecode check <input>Check a JWT token for issues; view recent checks without args
jwtdecode validate <input>Validate JWT token structure and format
jwtdecode generate <input>Generate JWT-related data or test tokens
jwtdecode format <input>Format JWT token output for readability
jwtdecode lint <input>Lint JWT tokens for common problems
jwtdecode explain <input>Explain JWT token structure (header, payload, signature)
jwtdecode convert <input>Convert JWT data between formats
jwtdecode template <input>Create or apply JWT templates
jwtdecode diff <input>Diff two JWT tokens to find claim differences
jwtdecode preview <input>Preview decoded JWT token output
jwtdecode fix <input>Auto-fix common JWT formatting issues
jwtdecode report <input>Generate a report from JWT analysis
jwtdecode statsShow summary statistics across all actions
jwtdecode export <fmt>Export all logs (formats: json, csv, txt)
jwtdecode search <term>Search across all log entries
jwtdecode recentShow the 20 most recent activity entries
jwtdecode statusHealth check — version, disk usage, entry count
jwtdecode helpShow help with all available commands
jwtdecode versionPrint current version (v2.0.0)

Each data command (check, validate, generate, etc.) works in two modes:

  • With arguments — logs the input with a timestamp and saves to its dedicated log file
  • Without arguments — displays the 20 most recent entries from that command's log

Data Storage

All data is stored locally in ~/.local/share/jwtdecode/. The directory structure:

  • check.log, validate.log, generate.log, etc. — per-command log files
  • history.log — unified activity log across all commands
  • export.json, export.csv, export.txt — generated export files

Set the JWTDECODE_DIR environment variable or modify DATA_DIR in the script to change the storage location.

Requirements

  • Bash 4.0+ (uses set -euo pipefail)
  • Standard Unix tools: date, wc, du, tail, grep, sed, cat
  • Works on Linux and macOS
  • No external packages or network access required

When to Use

  1. Debugging authentication flows — use jwtdecode check and jwtdecode explain to inspect token contents when troubleshooting login or API auth issues
  2. Validating token structure — run jwtdecode validate to verify that tokens conform to expected JWT format before deploying auth changes
  3. Comparing tokens across environments — use jwtdecode diff to spot claim differences between staging and production tokens
  4. Auditing token usage — use jwtdecode stats, jwtdecode recent, and jwtdecode export to review your JWT analysis history over time
  5. Formatting tokens for documentation — run jwtdecode format to produce clean, readable token breakdowns for technical docs or code reviews

Examples

bash
# Check a JWT token for issues
jwtdecode check "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."

# Validate a token's structure
jwtdecode validate "eyJhbGciOiJSUzI1NiJ9..."

# Explain what a JWT token contains
jwtdecode explain "eyJhbGciOiJIUzI1NiJ9.eyJzdWIiOiIxMjM0NTY3ODkwIn0..."

# View all recent checks (no args = show history)
jwtdecode check

# Export all history as JSON
jwtdecode export json

# Search for a specific claim in logs
jwtdecode search "admin"

# View summary statistics
jwtdecode stats

# Health check
jwtdecode status

Output

All commands output structured text to stdout. You can redirect output to a file:

bash
jwtdecode report mytoken > analysis.txt
jwtdecode export csv

Configuration

The data directory defaults to ~/.local/share/jwtdecode/. Modify the DATA_DIR variable at the top of script.sh to customize the storage path.


Powered by BytesAgain | bytesagain.com | hello@bytesagain.com

相关 Skills

前端设计

by anthropics

Universal
热门

面向组件、页面、海报和 Web 应用开发,按鲜明视觉方向生成可直接落地的前端代码与高质感 UI,适合做 landing page、Dashboard 或美化现有界面,避开千篇一律的 AI 审美。

想把页面做得既能上线又有设计感,就用前端设计:组件到整站都能产出,难得的是能避开千篇一律的 AI 味。

编码与调试
未扫描109.6k

网页构建器

by anthropics

Universal
热门

面向复杂 claude.ai HTML artifact 开发,快速初始化 React + Tailwind CSS + shadcn/ui 项目并打包为单文件 HTML,适合需要状态管理、路由或多组件交互的页面。

在 claude.ai 里做复杂网页 Artifact 很省心,多组件、状态和路由都能顺手搭起来,React、Tailwind 与 shadcn/ui 组合效率高、成品也更精致。

编码与调试
未扫描109.6k

网页应用测试

by anthropics

Universal
热门

用 Playwright 为本地 Web 应用编写自动化测试,支持启动开发服务器、校验前端交互、排查 UI 异常、抓取截图与浏览器日志,适合调试动态页面和回归验证。

借助 Playwright 一站式验证本地 Web 应用前端功能,调 UI 时还能同步查看日志和截图,定位问题更快。

编码与调试
未扫描109.6k

相关 MCP 服务

GitHub

编辑精选

by GitHub

热门

GitHub 是 MCP 官方参考服务器,让 Claude 直接读写你的代码仓库和 Issues。

这个参考服务器解决了开发者想让 AI 安全访问 GitHub 数据的问题,适合需要自动化代码审查或 Issue 管理的团队。但注意它只是参考实现,生产环境得自己加固安全。

编码与调试
82.9k

by Context7

热门

Context7 是实时拉取最新文档和代码示例的智能助手,让你告别过时资料。

它能解决开发者查找文档时信息滞后的问题,特别适合快速上手新库或跟进更新。不过,依赖外部源可能导致偶尔的数据延迟,建议结合官方文档使用。

编码与调试
51.5k

by tldraw

热门

tldraw 是让 AI 助手直接在无限画布上绘图和协作的 MCP 服务器。

这解决了 AI 只能输出文本、无法视觉化协作的痛点——想象让 Claude 帮你画流程图或白板讨论。最适合需要快速原型设计或头脑风暴的开发者。不过,目前它只是个基础连接器,你得自己搭建画布应用才能发挥全部潜力。

编码与调试
46.2k

评论