3.5k★by lxgicstudios
JWT Decode - Token Inspector CLI – OpenClaw Skill
JWT Decode - Token Inspector CLI is an OpenClaw Skills integration for coding workflows. Decode and inspect JWT tokens from command line. Check expiration, extract claims, debug auth. No more jwt.io tabs. Free CLI tool.
Skill Snapshot
| name | JWT Decode - Token Inspector CLI |
| description | Decode and inspect JWT tokens from command line. Check expiration, extract claims, debug auth. No more jwt.io tabs. Free CLI tool. OpenClaw Skills integration. |
| owner | lxgicstudios |
| repository | lxgicstudios/jwt-decode |
| language | Markdown |
| license | MIT |
| topics | |
| security | L1 |
| install | openclaw add @lxgicstudios/jwt-decode |
| last updated | Feb 7, 2026 |
Maintainer

lxgicstudios
Maintains JWT Decode - Token Inspector CLI in the OpenClaw Skills directory.
View GitHub profilename: JWT Decode - Token Inspector CLI description: Decode and inspect JWT tokens from command line. Check expiration, extract claims, debug auth. No more jwt.io tabs. Free CLI tool.
JWT Decode
Decode JWTs from the terminal. See what's inside, check if expired.
Installation
npm install -g @lxgicstudios/jwt-decode
Commands
Decode Token
npx @lxgicstudios/jwt-decode eyJhbGciOiJIUzI1NiIs...
# Works with Bearer prefix
npx @lxgicstudios/jwt-decode "Bearer eyJhbGci..."
From Environment Variable
echo $AUTH_TOKEN | npx @lxgicstudios/jwt-decode
From File
npx @lxgicstudios/jwt-decode -f token.txt
Check if Expired
npx @lxgicstudios/jwt-decode --check $TOKEN && echo "Valid" || echo "Expired"
Extract Specific Claim
npx @lxgicstudios/jwt-decode -c sub $TOKEN
npx @lxgicstudios/jwt-decode -c email $TOKEN
Example Output
Header
──────
alg: "HS256"
typ: "JWT"
Payload
───────
sub: "1234567890"
name: "John Doe"
email: "john@example.com"
iat: 1706547200 (2024-01-29T16:00:00.000Z)
exp: 1706633600 (2024-01-30T16:00:00.000Z)
Status
──────
Valid - expires in 23 hours
Options
| Option | Description |
|---|---|
-f, --file | Read from file |
-c, --claim | Extract specific claim |
--header | Show only header |
--payload | Show only payload |
--json | JSON output |
--check | Exit 1 if expired |
Common Use Cases
Debug auth token:
npx @lxgicstudios/jwt-decode $AUTH_TOKEN
Get user ID from token:
npx @lxgicstudios/jwt-decode -c sub $TOKEN
Use in scripts:
if npx @lxgicstudios/jwt-decode --check $TOKEN 2>/dev/null; then
echo "Token valid"
else
echo "Token expired, refreshing..."
fi
Features
- Colored, readable output
- Automatic Bearer prefix handling
- Human-readable expiration times
- Timestamp conversion
- Script-friendly exit codes
- JSON output mode
Built by LXGIC Studios
No README available.
Permissions & Security
Security level L1: Low-risk skills with minimal permissions. Review inputs and outputs before running in production.
Requirements
- OpenClaw CLI installed and configured.
- Language: Markdown
- License: MIT
- Topics:
FAQ
How do I install JWT Decode - Token Inspector CLI?
Run openclaw add @lxgicstudios/jwt-decode in your terminal. This installs JWT Decode - Token Inspector CLI into your OpenClaw Skills catalog.
Does this skill run locally or in the cloud?
OpenClaw Skills execute locally by default. Review the SKILL.md and permissions before running any skill.
Where can I verify the source code?
The source repository is available at https://github.com/openclaw/skills/tree/main/skills/lxgicstudios/jwt-decode. Review commits and README documentation before installing.
