jwt-decode-token-inspector-cli
✓Verified·Scanned 2/18/2026
Decode and inspect JWT tokens from command line. Check expiration, extract claims, debug auth. No more jwt.io tabs. Free CLI tool.
from clawhub.ai·vf1b2d37·2.2 KB·0 installs
Scanned from 0.1.0 at f1b2d37 · Transparency log ↗
$ vett add clawhub.ai/lxgicstudios/jwt-decode-token-inspector-cli
JWT Decode
Decode JWTs from the terminal. See what's inside, check if expired.
Installation
npm install -g @lxgicstudios/jwt-decode
Commands
Decode Token
npx @lxgicstudios/jwt-decode eyJhbGciOiJIUzI1NiIs...
# Works with Bearer prefix
npx @lxgicstudios/jwt-decode "Bearer eyJhbGci..."
From Environment Variable
echo $AUTH_TOKEN | npx @lxgicstudios/jwt-decode
From File
npx @lxgicstudios/jwt-decode -f token.txt
Check if Expired
npx @lxgicstudios/jwt-decode --check $TOKEN && echo "Valid" || echo "Expired"
Extract Specific Claim
npx @lxgicstudios/jwt-decode -c sub $TOKEN
npx @lxgicstudios/jwt-decode -c email $TOKEN
Example Output
Header
──────
alg: "HS256"
typ: "JWT"
Payload
───────
sub: "1234567890"
name: "John Doe"
email: "john@example.com"
iat: 1706547200 (2024-01-29T16:00:00.000Z)
exp: 1706633600 (2024-01-30T16:00:00.000Z)
Status
──────
Valid - expires in 23 hours
Options
| Option | Description |
|---|---|
-f, --file | Read from file |
-c, --claim | Extract specific claim |
--header | Show only header |
--payload | Show only payload |
--json | JSON output |
--check | Exit 1 if expired |
Common Use Cases
Debug auth token:
npx @lxgicstudios/jwt-decode $AUTH_TOKEN
Get user ID from token:
npx @lxgicstudios/jwt-decode -c sub $TOKEN
Use in scripts:
if npx @lxgicstudios/jwt-decode --check $TOKEN 2>/dev/null; then
echo "Token valid"
else
echo "Token expired, refreshing..."
fi
Features
- Colored, readable output
- Automatic Bearer prefix handling
- Human-readable expiration times
- Timestamp conversion
- Script-friendly exit codes
- JSON output mode
Built by LXGIC Studios