Agent skills for decoding, encoding, and validating JSON Web Tokens.
- jwt-decode — Decode and inspect JWTs without verification. Shows header, payload, claims, and flags security issues like
alg: noneor missing expiration. - jwt-encode — Create and sign JWTs for testing and development. Supports HMAC, RSA, and ECDSA algorithms.
- jwt-validate — Verify JWT signatures and validate claims. Supports shared secrets, PEM keys, and JWKS endpoints.
npx skills add jsonwebtoken/jwt-skillsInstall a specific skill:
npx skills add jsonwebtoken/jwt-skills -s jwt-decodeOnce installed, the skills activate automatically when relevant. You can also invoke them directly:
/jwt-decode eyJhbGciOiJIUzI1NiIs...
/jwt-encode {"sub": "1234567890", "name": "Test User"}
/jwt-validate eyJhbGciOiJIUzI1NiIs...
These skills handle potential sensitive data (tokens, secrets, keys). They follow these principles:
- Secrets are passed via inline environment variables, never as literal command-line arguments
- Packages are never installed without user consent
alg: nonetokens are always flagged as a security risk- Signature verification never trusts the token's
algheader (prevents algorithm confusion attacks) - Sensitive data in payloads is flagged (JWTs are encoded, not encrypted)
Securely implement authentication with JWTs using Auth0 on any stack and any device in less than 10 minutes. Create a free account at auth0.com/signup
These skills are powered by AI agents, which can make mistakes. Always double-check the output before using tokens or validation results in production or security-sensitive contexts.
Copyright 2026 Okta, Inc.
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at: http://www.apache.org/licenses/LICENSE-2.0