Jump to content

Tutorial: Jwudtool

jwudtool verify --secret mysecret <token> Expected output:

"sub": "1234567890", "name": "John Doe", "iat": 1516239022

✗ Signature mismatch For RS256 tokens, use a public key: jwudtool tutorial

jwudtool version # Output: jwudtool 0.2.0 | Command | Purpose | |---------|---------| | decode | Decode header + payload without verifying signature | | verify | Check signature using a secret or public key | | forge | Create a new token from an existing one (change claims) | | fuzz | Test token against common attacks | Tutorial: Decode a JWT Given this sample token:

go install github.com/youruser/jwudtool@latest Got a feature request or found a bug? Open an issue on GitHub . jwudtool verify --secret mysecret &lt

✓ Signature valid If invalid:

HEADER:

jwudtool decode eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...

×
×
  • Create New...