testing-jwt-token-security
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill recommends downloading the
jwt_tooltoolkit from its GitHub repository and installing thePyJWTlibrary. These are well-known, legitimate tools required for the skill's stated purpose of security auditing. - [COMMAND_EXECUTION]: The documentation provides shell commands for using established security binaries such as
hashcatandjohn the ripperto perform cryptographic analysis. These are intended for use by a practitioner during an authorized penetration test. - [SAFE]: The skill's primary automation script,
agent.py, performs network-based security tests (e.g., algorithm manipulation and revocation checks) against user-defined target URLs. The operations are transparent and no evidence of unauthorized data exfiltration or credential harvesting was found. - [SAFE]: Evaluated the surface for indirect prompt injection regarding the processing of external JWT tokens. The
agent.pyscript ingests untrusted tokens via thetokenargument, which are then decoded and displayed. Boundary markers are present in the output (e.g.,[*] JWT Payload:) to distinguish data from instructions. The skill possesses network capabilities and file-write access for reporting, but it does not execute content derived from the token, maintaining a low risk profile.
Audit Metadata