ToolypetMCP
beginner2 minutesdev

JWT Token Debug Pipeline

Decode JWTs, check timestamps, and verify Base64 payloads for authentication debugging.

jwtdebugtimestampauthentication

このレシピの使いどころ

Debug authentication issues by inspecting JWT tokens. Common problems include expired tokens, wrong audience claims, and mismatched algorithms.

ステップ

1

Inspect the token structure

プロンプト:Decode this JWT token and show the header, payload, and signature
2

Timestamp Converter

このツールを試す

Check token expiration timing

プロンプト:Convert the JWT 'exp' and 'iat' timestamps to human-readable dates
3

Manually verify the payload encoding

プロンプト:Decode the JWT payload section (base64url) to see the raw JSON

よくある質問

Is it safe to decode JWTs in the browser?

The header and payload are Base64-encoded (not encrypted), so they're always readable. The signature prevents tampering but doesn't hide content. Never put secrets in JWT payloads.

How do I debug 'token expired' errors?

Decode the token and check the 'exp' claim against the current time. Common causes: clock skew between servers, token not refreshed, or timezone issues.

関連レシピ