jwt-decode-token-inspector-cli

Verified·Scanned 2/18/2026

Decode and inspect JWT tokens from command line. Check expiration, extract claims, debug auth. No more jwt.io tabs. Free CLI tool.

from clawhub.ai·vf1b2d37·2.2 KB·0 installs
Scanned from 0.1.0 at f1b2d37 · Transparency log ↗
$ vett add clawhub.ai/lxgicstudios/jwt-decode-token-inspector-cli

JWT Decode

Decode JWTs from the terminal. See what's inside, check if expired.

Installation

npm install -g @lxgicstudios/jwt-decode

Commands

Decode Token

npx @lxgicstudios/jwt-decode eyJhbGciOiJIUzI1NiIs...

# Works with Bearer prefix
npx @lxgicstudios/jwt-decode "Bearer eyJhbGci..."

From Environment Variable

echo $AUTH_TOKEN | npx @lxgicstudios/jwt-decode

From File

npx @lxgicstudios/jwt-decode -f token.txt

Check if Expired

npx @lxgicstudios/jwt-decode --check $TOKEN && echo "Valid" || echo "Expired"

Extract Specific Claim

npx @lxgicstudios/jwt-decode -c sub $TOKEN
npx @lxgicstudios/jwt-decode -c email $TOKEN

Example Output

Header
──────
  alg: "HS256"
  typ: "JWT"

Payload
───────
  sub: "1234567890"
  name: "John Doe"
  email: "john@example.com"
  iat: 1706547200 (2024-01-29T16:00:00.000Z)
  exp: 1706633600 (2024-01-30T16:00:00.000Z)

Status
──────
  Valid - expires in 23 hours

Options

OptionDescription
-f, --fileRead from file
-c, --claimExtract specific claim
--headerShow only header
--payloadShow only payload
--jsonJSON output
--checkExit 1 if expired

Common Use Cases

Debug auth token:

npx @lxgicstudios/jwt-decode $AUTH_TOKEN

Get user ID from token:

npx @lxgicstudios/jwt-decode -c sub $TOKEN

Use in scripts:

if npx @lxgicstudios/jwt-decode --check $TOKEN 2>/dev/null; then
  echo "Token valid"
else
  echo "Token expired, refreshing..."
fi

Features

  • Colored, readable output
  • Automatic Bearer prefix handling
  • Human-readable expiration times
  • Timestamp conversion
  • Script-friendly exit codes
  • JSON output mode

Built by LXGIC Studios

🔗 GitHub · Twitter