skills$openclaw/JWT Decode - Token Inspector CLI
lxgicstudios3.5k

by lxgicstudios

JWT Decode - Token Inspector CLI – OpenClaw Skill

JWT Decode - Token Inspector CLI is an OpenClaw Skills integration for coding workflows. Decode and inspect JWT tokens from command line. Check expiration, extract claims, debug auth. No more jwt.io tabs. Free CLI tool.

3.5k stars5.2k forksSecurity L1
Updated Feb 7, 2026Created Feb 7, 2026coding

Skill Snapshot

nameJWT Decode - Token Inspector CLI
descriptionDecode and inspect JWT tokens from command line. Check expiration, extract claims, debug auth. No more jwt.io tabs. Free CLI tool. OpenClaw Skills integration.
ownerlxgicstudios
repositorylxgicstudios/jwt-decode
languageMarkdown
licenseMIT
topics
securityL1
installopenclaw add @lxgicstudios/jwt-decode
last updatedFeb 7, 2026

Maintainer

lxgicstudios

lxgicstudios

Maintains JWT Decode - Token Inspector CLI in the OpenClaw Skills directory.

View GitHub profile
File Explorer
2 files
.
_meta.json
298 B
SKILL.md
2.2 KB
SKILL.md

name: JWT Decode - Token Inspector CLI description: Decode and inspect JWT tokens from command line. Check expiration, extract claims, debug auth. No more jwt.io tabs. Free CLI tool.

JWT Decode

Decode JWTs from the terminal. See what's inside, check if expired.

Installation

npm install -g @lxgicstudios/jwt-decode

Commands

Decode Token

npx @lxgicstudios/jwt-decode eyJhbGciOiJIUzI1NiIs...

# Works with Bearer prefix
npx @lxgicstudios/jwt-decode "Bearer eyJhbGci..."

From Environment Variable

echo $AUTH_TOKEN | npx @lxgicstudios/jwt-decode

From File

npx @lxgicstudios/jwt-decode -f token.txt

Check if Expired

npx @lxgicstudios/jwt-decode --check $TOKEN && echo "Valid" || echo "Expired"

Extract Specific Claim

npx @lxgicstudios/jwt-decode -c sub $TOKEN
npx @lxgicstudios/jwt-decode -c email $TOKEN

Example Output

Header
──────
  alg: "HS256"
  typ: "JWT"

Payload
───────
  sub: "1234567890"
  name: "John Doe"
  email: "john@example.com"
  iat: 1706547200 (2024-01-29T16:00:00.000Z)
  exp: 1706633600 (2024-01-30T16:00:00.000Z)

Status
──────
  Valid - expires in 23 hours

Options

OptionDescription
-f, --fileRead from file
-c, --claimExtract specific claim
--headerShow only header
--payloadShow only payload
--jsonJSON output
--checkExit 1 if expired

Common Use Cases

Debug auth token:

npx @lxgicstudios/jwt-decode $AUTH_TOKEN

Get user ID from token:

npx @lxgicstudios/jwt-decode -c sub $TOKEN

Use in scripts:

if npx @lxgicstudios/jwt-decode --check $TOKEN 2>/dev/null; then
  echo "Token valid"
else
  echo "Token expired, refreshing..."
fi

Features

  • Colored, readable output
  • Automatic Bearer prefix handling
  • Human-readable expiration times
  • Timestamp conversion
  • Script-friendly exit codes
  • JSON output mode

Built by LXGIC Studios

🔗 GitHub · Twitter

README.md

No README available.

Permissions & Security

Security level L1: Low-risk skills with minimal permissions. Review inputs and outputs before running in production.

Requirements

  • OpenClaw CLI installed and configured.
  • Language: Markdown
  • License: MIT
  • Topics:

FAQ

How do I install JWT Decode - Token Inspector CLI?

Run openclaw add @lxgicstudios/jwt-decode in your terminal. This installs JWT Decode - Token Inspector CLI into your OpenClaw Skills catalog.

Does this skill run locally or in the cloud?

OpenClaw Skills execute locally by default. Review the SKILL.md and permissions before running any skill.

Where can I verify the source code?

The source repository is available at https://github.com/openclaw/skills/tree/main/skills/lxgicstudios/jwt-decode. Review commits and README documentation before installing.