{
  "name": "JWT Auth Debugging",
  "version": "1.0",
  "description": "Decode a JWT token, verify its signature integrity, and check if the token has expired.",
  "use_case": "Debug failing JWT authentication by inspecting token payload, validating the signature, and checking expiration timestamps.",
  "keywords": ["JWT debugging", "token verification", "auth troubleshooting"],
  "tools": [
    {
      "step": 1,
      "name": "JWT Decoder",
      "slug": "jwt-decoder",
      "action": "Decode the JWT token to inspect header and payload claims",
      "params": {
        "input": "Paste your JWT token (eyJhbGciOiJIUzI1NiIs...)"
      }
    },
    {
      "step": 2,
      "name": "Hash Generator",
      "slug": "hash-generator",
      "action": "Hash the signature portion to verify integrity against known secret",
      "params": {
        "algorithm": "SHA-256",
        "input": "header.payload portion of JWT"
      }
    },
    {
      "step": 3,
      "name": "Timestamp Converter",
      "slug": "timestamp-converter",
      "action": "Convert exp and iat claims from Unix epoch to human-readable dates",
      "params": {
        "input": "exp claim value (e.g., 1717200000)"
      }
    }
  ]
}
