(output will appear here)
How to use
This is a static analysis tool (no signature verification, no network calls).
- Paste the JWT into the input box.
- (Optional) Set Now to a specific epoch time to reproduce results.
- Click Run Security Check to get a compact report and findings.
FAQ
Does this tool verify the JWT signature?
No. It only decodes and runs security checks on the header/claims without validating the signature.
Why is alg=none considered dangerous?
If your backend accepts alg=none, attackers can forge tokens without a signature. Most systems should reject it.
What are jku and x5u risks?
They can point to remote key material; if your server fetches keys from attacker-controlled URLs, it can be tricked into accepting forged tokens.
Why is a suspicious kid flagged?
kid is untrusted input; path traversal or URL-like values can trigger file reads or SSRF in buggy key resolvers.
What does “long-lived token” mean here?
If exp is far in the future (default > 30 days), compromise impact is higher. Prefer short-lived access tokens with refresh flows.
Can this tool check JWE (encrypted JWT)?
It can decode and analyze the JWE header, but it can’t read encrypted claims without decryption keys.
Is any data sent to a server?
No. The checker runs in your browser and does not make network requests.