Install
openclaw skills install jwt-toolkitDecode, inspect, and validate JWT (JSON Web Token) tokens from the command line. Shows header, payload, algorithm, expiry status, and known claim labels. Use when debugging auth tokens, checking if a JWT is expired, inspecting JWT claims, decoding Bearer tokens, or analyzing token structure. Triggers on "decode JWT", "inspect token", "JWT expired", "parse JWT", "check Bearer token", "token claims".
openclaw skills install jwt-toolkitZero-dependency JWT decoder and inspector. Decodes any JWT token and shows header, payload claims, algorithm info, expiry status, and signature details.
# Decode a JWT token
python3 scripts/jwt_decode.py eyJhbGciOiJIUzI1NiIs...
# Read token from file
python3 scripts/jwt_decode.py --file token.txt
# Read from stdin (pipe from curl, etc.)
echo "eyJ..." | python3 scripts/jwt_decode.py --stdin
# JSON output for scripting
python3 scripts/jwt_decode.py eyJ... --format json
# Also handles "Bearer " prefix automatically
python3 scripts/jwt_decode.py "Bearer eyJhbGciOiJIUzI1NiIs..."
none algorithm)