Vickie Li·Follow1 min read·Nov 6, 2019--ListenShareHi Jorge, details on how to build an exploit were left out intentionally. But if you want to experiment, you could build a vulnerable JWT application yourself, or try and break libraries that were found vulnerable in the past.