Open ruifung opened 6 years ago
In accordance with https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/ Most, if not all JWT libraries require specifying the verification algorithm when verifying.
In accordance with https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/ Most, if not all JWT libraries require specifying the verification algorithm when verifying.