Skip to content
clusters: prooflayer · edgemarket · edgefinance · synthforge · mediakit · wordmint · webprobe · locale · comppoint
$ man jwt-decode

/jwt-decode(1)

agentutility / web-probe / jwt-decode
PRICE / CALL
$0.003
USDC · base mainnet · scheme: exact
METHOD
POST
CLUSTER
webprobe
CATEGORY
utilities
STATUS
live
NAME
jwt-decode jwt decoder / token inspector / debug tool
SYNOPSIS
POST https://x402.org/v1/jwt-decode
     Content-Type: application/json
     X-PAYMENT:    <signed-transferWithAuthorization>

     { ... }
↳ first call → 402 Payment Required. Sign USDCtransferWithAuthorization, retry with theX-PAYMENT header.
DESCRIPTION

JWT decoder / token inspector / debug tool. Splits a JWT into header / payload / signature, base64url-decodes each, parses claims (iss, aud, sub, jti, iat, exp, nbf, kid, alg), and reports clock-validity. Does NOT verify signatures.

INPUTrequest schema
propertytypedescriptionreq?
jwtstringJWT (with or without 'Bearer ' prefix).required
OUTPUTresponse shape
fieldtypedescription
headerobjectDecoded JWT header object with parsed JOSE fields like alg, typ, kid, and any custom header parameters.
payloadobjectDecoded JWT payload object with all claims parsed from the base64url-decoded middle segment.
signaturestringRaw signature segment from the JWT as a base64url string; not verified by this endpoint.
algorithmstringSigning algorithm declared in the header's alg field, such as HS256, RS256, ES256, or none.
key_idstringKey identifier from the header's kid field, used by verifiers to select the right signing key.
typestringToken type from the header's typ field, typically JWT but sometimes at+jwt or similar variants.
claimsobjectStandard JWT claims extracted from payload: iss, aud, sub, jti, iat, exp, nbf with parsed timestamps.
is_expiredbooleanTrue if exp claim is present and the expiration timestamp is in the past relative to server clock.
is_not_yet_validbooleanTrue if nbf claim is present and the not-before timestamp is in the future relative to server clock.
is_currently_valid_by_clockbooleanTrue if the token is neither expired nor not-yet-valid by clock; signature validity is not checked.
payload_size_bytesnumberByte length of the decoded payload JSON, useful for spotting oversized tokens.
notestringReminder that this endpoint only decodes and clock-checks; it does not cryptographically verify signatures.
EXAMPLEStwo ways to call
EXAMPLE 1 · curl
curl -X POST https://x402.org/v1/jwt-decode \
  -H 'Content-Type: application/json' \
  -d '{ }'
first response = 402 Payment Required with payment requirements; sign + retry with X-PAYMENT.
EXAMPLE 2 · mcp
# install once
claude mcp add x402 --command "npx x402-deployer-mcp"

# then ask Claude Code:
# "use the jwt-decode tool to ..."
MCP server handles payment automatically — your coding agent just calls the tool by name.
METADATA
tags
jwttokenauthdebugdeveloper
methods
POST
cluster
webprobe
price
$0.003 USDC per call
ADJACENTother endpoints in webprobe
endpointdescriptionprice
homoglyph-checkHomoglyph attack detector / Unicode lookalike scanner.$0.003
url-metadata-extractURL metadata extractor / OG tags / Open Graph parser / Twitter Card parser / meta tag extractor / link preview / page metadata / favicon…$0.003
arxiv-bibtexarXiv to BibTeX / arxiv citation generator / paper bibtex / LaTeX citation builder / academic citation lookup.$0.002
github-readmeGitHub README fetch / repo readme / open-source-readme-as-markdown / package documentation puller.$0.002
keyword-suggestKeyword autocomplete / search suggest / SEO keyword research / query expansion / autocomplete suggestions.$0.002
qr-code-decodeQR decoder / QR reader / scan QR from URL / QR code OCR / barcode reader / link extraction from QR.$0.002
disposable-email-checkDisposable email detector / fake email filter / fraud signup defense.$0.005
domain-availabilityDomain availability / RDAP lookup / WHOIS replacement / domain registration checker / expiry date lookup.$0.005
SEE ALSO
agentutility(7) · webprobe(7) · x402(7) · mcp(7) · llms.txt · registry.json · bazaar.x402.org