security validator

PGP Public Key Validator

Parse and validate PGP public key blocks in-browser to surface fingerprint, algorithm, and key size securely.

Results

Processing…
Status
Processing...
Details
Processing...
Fingerprint
Processing...
Algorithm
Processing...
Bits
Processing...
Primary user ID
Processing...
Created
Processing...

Rules & checks

Parses armored blocks with openpgp to verify headers and decode the payload.

Extracts fingerprint, algorithm/curve, bits, creation time, and primary user ID when available.

Runs fully client-side—nothing is stored, logged, or transmitted.

When to use it

  • Check PGP public keys submitted via forms before accepting them
  • Validate exported keys before sharing or importing into a keyring
  • Confirm armor integrity for CI/CD secrets and automation

Tips

  • Do not paste private keys—this is for public keys only
  • Cross-check the fingerprint with a trusted channel before encrypting to someone
  • If the key might be revoked or expired, confirm with your local PGP tool or keyserver

Examples

Valid public key

  • Headers present and openpgp parses the key -> fingerprint and metadata shown

Missing headers

  • No BEGIN/END -> flagged

Corrupted body

  • Bad armor/base64 -> flagged

FAQs

Do you store my key?
No. Parsing happens locally in your browser; nothing is uploaded or persisted.
Do you verify signatures or trust?
Not yet. This focuses on structure and metadata; use your PGP tool for trust, revocation, and signatures.

Related validators

Client-side parsing only; does not check trust chains, revocation, or signatures.