Skip to main content
Glama

jwt_tool

Test JSON Web Tokens for security flaws, including signature weaknesses and algorithm manipulation.

Instructions

JWT security testing

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
tokenYes
session_idYes
urlNo
Behavior2/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

The description is too vague to disclose behavioral traits such as whether the tool makes network requests, modifies data, or requires authentication. It does not indicate if testing is passive or active, nor the nature of the output. With no annotations, the description should have provided these details.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness2/5

Is the description appropriately sized, front-loaded, and free of redundancy?

The description is extremely short (three words), which might be considered concise, but it sacrifices essential detail. It is not front-loaded with key information; rather, it provides insufficient guidance. Every sentence should earn its place, and this one fails to justify its brevity.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness1/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

Given the lack of output schema, annotations, and parameter descriptions, the tool description is severely incomplete. It does not explain what the tool returns, potential side effects, or error conditions. The agent cannot effectively decide when or how to invoke this tool.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters1/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

The description does not explain the meaning or usage of any of the three parameters (token, session_id, url). With 0% schema description coverage, the agent has no information about what values these parameters expect or how they affect execution. This is a critical gap.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose3/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description 'JWT security testing' indicates the tool deals with JWTs and security testing, which is moderately clear but lacks specificity. It does not distinguish from other security testing tools like nmap or sqlmap, making it generic. A more precise verb such as 'crack', 'decode', or 'validate' would improve clarity.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines2/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

No guidance is provided on when to use this tool versus its many siblings (e.g., nmap, ffuf, nuclei). The description does not mention prerequisites, expected inputs, or scenarios where jwt_tool is preferred. This leaves the agent to guess the tool's purpose.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/MohitSahoo/MCPToolForWebVulnerabilities-'

If you have feedback or need assistance with the MCP directory API, please join our Discord server