Versions:

  • 1.1.4

jwt-term, published by Felipe Pires Morandini, is a command-line utility designed for security-conscious developers who need to inspect, validate, or manipulate JSON Web Tokens without exposing sensitive payloads to online services. The tool is categorized under Developer-Tools/Security and operates entirely offline, ensuring that no JWT data leaves the local machine. Version 1.1.4, the first and currently only release, emphasizes speed and safety, parsing tokens in milliseconds while highlighting algorithm inconsistencies, signature mismatches, and claim expiration in color-coded terminal output. Typical use cases include debugging authentication flows in microservice architectures, verifying tokens generated by OAuth or OpenID Connect providers, extracting custom claims for shell scripts, and batch-validating lists of tokens during penetration-testing or CI pipelines. jwt-term accepts tokens through positional arguments, stdin, or clipboard integration, and can output decoded headers and payloads in both formatted JSON and raw base64url forms, making it easy to pipe results to other Unix tools. The lightweight binary has no external dependencies, runs on Windows, macOS, and Linux, and can be integrated into GitHub Actions or Azure DevOps workflows to gate deployments when tokens fail validation. Because the utility ships as a single executable, it can be dropped into containers or serverless runtimes without altering base images. jwt-term is available for free on get.nero.com, with downloads provided via trusted Windows package sources such as winget, always delivering the latest version, and supporting batch installation of multiple applications.

Tags: