
Research
NPM targeted by malware campaign mimicking familiar library names
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
keycloak-jwt-checker
Advanced tools
A little tool for debugging claims contained in JSON Web Tokens (JWT) issued by Keycloak confidential clients
A little tool for debugging claims contained in JSON Web Tokens (JWT) issued by Keycloak confidential clients.
Keycloak configuration can be quite complex. So I found it useful to have a tool to look at the claims contained in JWTs. You can see quickly if they contain the values you need for your use case.
The CLI tool takes the credentials of the client you configured in Keycloak and uses some user's credentials to issue tokens for that user using OIDC endpoints. It then decodes the JWT and displays its claim content on stdout.
pip install keycloak-jwt-checker
$ keycloak-jwt-checker --help
Usage: keycloak-jwt-checker [OPTIONS]
Keycloak JWT Checker.
A little tool for debugging claims contained in JSON Web Tokens (JWT) issued
by Keycloak confidential clients.
Options:
--server-url TEXT URL of the Keycloak server [required]
--client-id TEXT Client ID [required]
--client-secret TEXT Client secret [required]
--realm TEXT Realm [required]
--username TEXT Username of a Keycloak user you configured for this
client [required]
--password TEXT Password of a Keycloak user you configured for this
client [required]
--skip-tls-verification Set this flag if the TLS verification should be
skipped on OIDC endpoints
--help Show this message and exit.
If you are concerned about security or just don't want to use the CLI options for secrets or passwords, you can also use the following environment variables to provide these values to Keycloak JWT Checker.
KEYCLOAK_JWT_CHECKER_SERVER_URL=http:localhost:8080
KEYCLOAK_JWT_CHECKER_CLIENT_ID=test
KEYCLOAK_JWT_CHECKER_CLIENT_SECRET=verysecretsecret
KEYCLOAK_JWT_CHECKER_REALM=myrealm
KEYCLOAK_JWT_CHECKER_USERNAME=testuser
KEYCLOAK_JWT_CHECKER_PASSWORD=testpassword
KEYCLOAK_JWT_CHECKER_SKIP_TLS_VERIFICATION=true
FAQs
A little tool for debugging claims contained in JSON Web Tokens (JWT) issued by Keycloak confidential clients
We found that keycloak-jwt-checker demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Socket uncovered npm malware campaign mimicking popular Node.js libraries and packages from other ecosystems; packages steal data and execute remote code.
Research
Socket's research uncovers three dangerous Go modules that contain obfuscated disk-wiping malware, threatening complete data loss.
Research
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.