You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I don't know if there's security implications, might not because because header and payload are signed by the issuer, and any tampering would get detected. But since I can't for 100 % say it's a non-issue, I'd feel more comfortable rejecting the data that would get discarded otherwise.
WDYT?
The text was updated successfully, but these errors were encountered:
This library doesn't perform any "aud" check, as it's already described on the jwt.io website. But I would love to do it so if that is critical for you. Keep in mind that you can perform your own checks against these claims, see TokenValidator.
Because there's no
default:
branch erroring out, I could smuggle any valid JSON there, liketrue
,false
,null
, any number or an object.jwt/claims.go
Line 69 in 1639fcf
They'll simply be discarded.
I don't know if there's security implications, might not because because header and payload are signed by the issuer, and any tampering would get detected. But since I can't for 100 % say it's a non-issue, I'd feel more comfortable rejecting the data that would get discarded otherwise.
WDYT?
The text was updated successfully, but these errors were encountered: