Gathering detailed insights and metrics for jose
Gathering detailed insights and metrics for jose
Gathering detailed insights and metrics for jose
Gathering detailed insights and metrics for jose
JWA, JWS, JWE, JWT, JWK, JWKS for Node.js, Browser, Cloudflare Workers, Deno, Bun, and other Web-interoperable runtimes
npm install jose
Typescript
Module System
Node Version
NPM Version
99.8
Supply Chain
100
Quality
89.6
Maintenance
100
Vulnerability
100
License
TypeScript (86.18%)
JavaScript (13.17%)
Shell (0.65%)
Total Downloads
1,267,480,345
Last Day
3,010,796
Last Week
16,000,647
Last Month
65,506,156
Last Year
607,804,733
MIT License
6,496 Stars
1,667 Commits
336 Forks
39 Watchers
5 Branches
31 Contributors
Updated on May 23, 2025
Minified
Minified + Gzipped
Latest Version
6.0.11
Package Id
jose@6.0.11
Unpacked Size
245.05 kB
Size
47.60 kB
File Count
102
NPM Version
10.9.2
Node Version
22.15.0
Published on
May 05, 2025
Cumulative downloads
Total Downloads
Last Day
3.5%
3,010,796
Compared to previous day
Last Week
3.9%
16,000,647
Compared to previous week
Last Month
4.3%
65,506,156
Compared to previous month
Last Year
68.3%
607,804,733
Compared to previous year
No dependencies detected.
jose
is JavaScript module for JSON Object Signing and Encryption, providing support for JSON Web Tokens (JWT), JSON Web Signature (JWS), JSON Web Encryption (JWE), JSON Web Key (JWK), JSON Web Key Set (JWKS), and more. The module is designed to work across various Web-interoperable runtimes including Node.js, browsers, Cloudflare Workers, Deno, Bun, and others.
If you want to quickly add JWT authentication to JavaScript apps, feel free to check out Auth0's JavaScript SDK and free plan. Create an Auth0 account; it's free!
Support from the community to continue maintaining and improving this module is welcome. If you find the module useful, please consider supporting the project by becoming a sponsor.
jose
has no dependencies and it exports tree-shakeable ESM1.
jose
is distributed via npmjs.com, jsr.io, jsdelivr.com, and github.com.
example
ESM import1
1import * as jose from 'jose'
The jose
module supports JSON Web Tokens (JWT) and provides functionality for signing and verifying tokens, as well as their JWT Claims Set validation.
jwtVerify
function
SignJWT
classThe jose
module supports encrypted JSON Web Tokens and provides functionality for encrypting and decrypting tokens, as well as their JWT Claims Set validation.
jwtDecrypt
functionEncryptJWT
classThe jose
module supports importing, exporting, and generating keys and secrets in various formats, including PEM formats like SPKI, X.509 certificate, and PKCS #8, as well as JSON Web Key (JWK).
The jose
module supports signing and verification of JWS messages with arbitrary payloads in Compact, Flattened JSON, and General JSON serialization syntaxes.
The jose
module supports encryption and decryption of JWE messages with arbitrary plaintext in Compact, Flattened JSON, and General JSON serialization syntaxes.
The following are additional features and utilities provided by the jose
module:
The jose
module is compatible with JavaScript runtimes that support the utilized Web API globals and standard built-in objects or are Node.js.
The following runtimes are supported (this is not an exhaustive list):
Please note that certain algorithms may not be available depending on the runtime used. You can find a list of available algorithms for each runtime in the specific issue links provided above.
Version | Security Fixes 🔑 | Other Bug Fixes 🐞 | New Features ⭐ | Runtime and Module type |
---|---|---|---|---|
v6.x | Security Policy | ✅ | ✅ | Universal2 ESM1 |
v5.x | Security Policy | ❌ | ❌ | Universal2 CJS + ESM |
v4.x | Security Policy | ❌ | ❌ | Universal2 CJS + ESM |
v2.x | Security Policy | ❌ | ❌ | Node.js CJS |
The algorithm implementations in jose
have been tested using test vectors from their respective specifications as well as RFC7520.
5.3/10
Summary
jose vulnerable to resource exhaustion via specifically crafted JWE with compressed plaintext
Affected Versions
< 2.0.7
Patched Versions
2.0.7
5.3/10
Summary
jose vulnerable to resource exhaustion via specifically crafted JWE with compressed plaintext
Affected Versions
>= 3.0.0, <= 4.15.4
Patched Versions
4.15.5
5.3/10
Summary
JOSE vulnerable to resource exhaustion via specifically crafted JWE
Affected Versions
>= 4.0.0, <= 4.9.1
Patched Versions
4.9.2
5.3/10
Summary
JOSE vulnerable to resource exhaustion via specifically crafted JWE
Affected Versions
>= 3.0.0, <= 3.20.3
Patched Versions
3.20.4
5.3/10
Summary
JOSE vulnerable to resource exhaustion via specifically crafted JWE
Affected Versions
>= 2.0.0, <= 2.0.5
Patched Versions
2.0.6
5.3/10
Summary
JOSE vulnerable to resource exhaustion via specifically crafted JWE
Affected Versions
>= 1.0.0, <= 1.28.1
Patched Versions
1.28.2
5.9/10
Summary
Padding Oracle Attack due to Observable Timing Discrepancy in jose
Affected Versions
>= 3.0.0, < 3.11.4
Patched Versions
3.11.4
5.9/10
Summary
Padding Oracle Attack due to Observable Timing Discrepancy in jose
Affected Versions
>= 2.0.0, < 2.0.5
Patched Versions
2.0.5
5.9/10
Summary
Padding Oracle Attack due to Observable Timing Discrepancy in jose
Affected Versions
>= 1.0.0, < 1.28.1
Patched Versions
1.28.1
Reason
security policy file detected
Details
Reason
30 commit(s) and 20 issue activity found in the last 90 days -- score normalized to 10
Reason
no dangerous workflow patterns detected
Reason
no binaries found in the repo
Reason
license file detected
Details
Reason
packaging workflow detected
Details
Reason
0 existing vulnerabilities detected
Reason
branch protection is not maximal on development and all release branches
Details
Reason
Found 0/30 approved changesets -- score normalized to 0
Reason
detected GitHub workflow tokens with excessive permissions
Details
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
no SAST tool detected
Details
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
Reason
project is not fuzzed
Details
Score
Last Scanned on 2025-05-12
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More