Paste a compact JWT to inspect header, payload, timing claims, JOSE risk signals and signature status. Nothing is uploaded, and this page never follows token header URLs.
Hapana. Decoding only base64url-decodes JSON. A token is trustworthy only after the signature, issuer, audience, expiration and application-specific rules are validated by the relying application.
JWT headers can contain arbitrary URLs. Blindly following them can create server-side request forgery and key-confusion problems. This page surfaces those URLs as risk signals instead of fetching them.
This page verifies HMAC-based HS tokens only. Public-key algorithms should be verified with the issuer public key or trusted JWKS in your backend or a dedicated local security workflow.