JWT Decoder + Security Auditor
Decode JSON Web Tokens and automatically audit them for common security vulnerabilities. Checks algorithm safety, expiry, and required claims.
What This Tool Checks
This auditor checks for the algorithm confusion attack (alg:none), weak symmetric algorithms (HS256 on public APIs), missing expiry claims, and other OWASP JWT security guidance. The signature is NOT verified — for signature verification you need the secret/public key on your backend.
Three Base64url segments separated by dots: header.payload.signature
Each segment is Base64url-decoded independently — no secret needed to read header or payload
Header: algorithm (alg) and token type. Payload: claims — sub, iss, aud, exp, iat, and custom fields
Flag expired tokens (exp), insecure algorithms (none, HS256 on public APIs), missing aud/iss, and weak secrets
Spec: RFC 7519 (JWT), RFC 7515 (JWS), RFC 7518 (JWA)