JWT / PASETO Decoder

Decode JWTs and PASETO tokens in your browser. Inspect headers, payloads, exp/iat/sub claims, and expiry timelines without uploading secrets.

Never upload secrets. This decoder runs in your browser.

Header

{
  "alg": "HS256",
  "typ": "JWT"
}

Payload

{
  "sub": "ada",
  "exp": 2033768000
}

Token type

JWT

Algorithm

HS256

Subject (sub)

ada

Expires

Mon, 12 Jun 2034 23:33:20 GMT

in 3,151 days

Status & warnings

No warnings detected.

Privacy-first decoding

Unlike hosted debuggers, Tinapps never transmits your JWTs or secrets. All parsing happens client-side, making it safe to share tokens in air-gapped or compliance-heavy environments.

Usage ideas

  • Drop into runbooks so oncall sees exp/iat/sub at a glance.
  • Hand tokens to LLM agents with links like /dev/jwt?token=....
  • Compare PASETO payloads while keeping encryption keys offline.