Token Format Checker

Inspect auth headers and token data in your browser. No input is sent to a server. Use it for first-pass checks on expiry, claims, and schemes.

Status

Runs in your browser. No input is sent to a server. Use this as a first-pass diagnostic step.

How to use

Paste a token string and click Check. Review likely formats, then move to the next verifier based on your target spec.

Notes (this tool)

  • This is heuristic detection. Confirm against both specification and implementation.
  • Different formats can look similar. Always prioritize issuer documentation.

About this page

What does this tool do?

Estimate candidate formats such as JWT/UUID/Hex/Base64URL and show length plus charset summary.

This is a first-pass classifier when you do not know what token you are looking at.

What this tool does

  • Detect JWT format
  • Detect UUID/Hex/Base64URL
  • Show length and character set

Notes

  • Detection is heuristic. Authenticity (signature verification) and semantic validity must be checked separately.
  • Even if a token looks like JWT, do not trust it without checking alg/signature/key ID (kid).
  • Base64URL check is charset-based; some contexts require additional padding/length validation.

Debugging workflow (recommended)

  • Paste tokens or authentication headers
  • Check claims, auth scheme, and expiration
  • Verify signature, scopes, and issuer with related tools

Referenced specs

  • RFC 7519 (JWT)
  • RFC 4648 (Base64 / Base64URL)
  • RFC 9562 (UUID)

FAQ

Why can auth fail even if a token looks like JWT?

Format checks do not verify signatures. Authentication still requires key, alg, iss/aud, and expiry validation.

Does UUID format imply a secure token?

No. UUID is an identifier format; authorization scope, revocation, and leak controls must be designed separately.

References

  1. RFC 7519
  2. RFC 4648
  3. RFC 9562

These links are generated from site_map rules in recommended diagnostic order.

  1. Password Policy Generator — Create policy text and validation regex from requirements
  2. Cookie Security Audit — Audit Secure/HttpOnly/SameSite settings
  3. URL Safe Random — Generate random strings using URL/filename-safe characters
  4. Password Seed Generator — Derive reproducible passwords from seed and constraints