<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: chawda mrunal</title>
    <description>The latest articles on Forem by chawda mrunal (@chawdamrunal).</description>
    <link>https://forem.com/chawdamrunal</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F479376%2F83c9a7ca-c9ed-41a9-b003-b57aac9ddc81.jpg</url>
      <title>Forem: chawda mrunal</title>
      <link>https://forem.com/chawdamrunal</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/chawdamrunal"/>
    <language>en</language>
    <item>
      <title>I Built JWTLens: A Burp Suite Extension to Detect JWT Security Weaknesses</title>
      <dc:creator>chawda mrunal</dc:creator>
      <pubDate>Thu, 19 Mar 2026 05:58:42 +0000</pubDate>
      <link>https://forem.com/chawdamrunal/i-built-jwtlens-a-burp-suite-extension-to-detect-jwt-security-weaknesses-454l</link>
      <guid>https://forem.com/chawdamrunal/i-built-jwtlens-a-burp-suite-extension-to-detect-jwt-security-weaknesses-454l</guid>
      <description>&lt;p&gt;JWTs are everywhere.&lt;/p&gt;

&lt;p&gt;They power authentication, session handling, API access, and secure communication across modern web applications. But JWT implementations are often misunderstood, misconfigured, or only partially validated. That is exactly where security issues start.&lt;/p&gt;

&lt;p&gt;I built JWTLens, an open-source Burp Suite extension for JWT security testing, to help security engineers, pentesters, and bug bounty hunters inspect, analyze, and test JWTs faster.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/chawdamrunal/JWTLens" rel="noopener noreferrer"&gt;Repo URL&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;What JWTLens does&lt;/p&gt;

&lt;p&gt;JWTLens helps you analyze JWTs during security testing and spot common weaknesses such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;algorithm confusion&lt;/li&gt;
&lt;li&gt;signature bypass attempts&lt;/li&gt;
&lt;li&gt;weak validation logic&lt;/li&gt;
&lt;li&gt;header manipulation&lt;/li&gt;
&lt;li&gt;missing or inconsistent claims checks&lt;/li&gt;
&lt;li&gt;passive JWT exposure in requests&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Instead of manually decoding tokens and switching between tools, JWTLens brings JWT analysis directly into your Burp Suite workflow.&lt;/p&gt;

&lt;p&gt;Why JWT security still matters&lt;/p&gt;

&lt;p&gt;A JWT is only as strong as the validation around it.&lt;/p&gt;

&lt;p&gt;Even when a token looks signed and valid, the application may still be vulnerable if it:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;trusts the wrong algorithm&lt;/li&gt;
&lt;li&gt;fails to verify claims properly&lt;/li&gt;
&lt;li&gt;accepts tampered headers&lt;/li&gt;
&lt;li&gt;assumes signature validation is enough&lt;/li&gt;
&lt;li&gt;exposes sensitive data in the payload&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That is why JWT testing is still a valuable part of application security assessments.&lt;/p&gt;

</description>
      <category>security</category>
      <category>jwt</category>
      <category>ai</category>
    </item>
    <item>
      <title>A Complete Guide to Securing Secrets in AWS Lambda</title>
      <dc:creator>chawda mrunal</dc:creator>
      <pubDate>Mon, 14 Apr 2025 05:32:35 +0000</pubDate>
      <link>https://forem.com/chawdamrunal/a-complete-guide-to-securing-secrets-in-aws-lambda-3a32</link>
      <guid>https://forem.com/chawdamrunal/a-complete-guide-to-securing-secrets-in-aws-lambda-3a32</guid>
      <description>&lt;p&gt;A security-focused walkthrough on managing secrets in AWS Lambda. Learn the real risks of using environment variables and how to secure them using AWS KMS, Secrets Manager, and Parameter Store. Built on AWS best practices and real examples.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://medium.com/bugbountywriteup/a-complete-guide-to-securing-secrets-in-aws-lambda-35304a133592" rel="noopener noreferrer"&gt;https://medium.com/bugbountywriteup/a-complete-guide-to-securing-secrets-in-aws-lambda-35304a133592&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>developer</category>
      <category>softwaredevelopment</category>
      <category>programming</category>
    </item>
  </channel>
</rss>
