Best of JWTDecember 2022

  1. 1
    Article
    Avatar of devtoDEV·3y

    Web Security 101 - Part 1: Secrets

    There are ways to expose environment variables to front-end code in the browser. There are packages like dotenv that allow you to configure environment variables in files. You can configure them when you host a site using a platform like Heroku or Netlify. You can also set them in your terminal environment manually.

  2. 2
    Article
    Avatar of communityCommunity Picks·3y

    How JWTs Could Be Dangerous and Its Alternatives

    JWTs are the most popularly used tokens for web authentication and managing user sessions in modern-day software applications. They are a standardized format for securely transferring cryptographically signed data across systems. JWTs can make websites vulnerable to a variety of high-security threats and attacks if not managed properly.

  3. 3
    Article
    Avatar of systemweaknessSystem Weakness·3y

    How to test for JWT attacks?

    A JWT consists of 3 parts: a header, a payload, and a signature. JWT attacks involve a user sending modified JWTs to the server in order to achieve a malicious goal. The data of header & payload can be easily read or modified by anyone with access to the token.