When editing a widget, toggling the JWT option (enable or disable) causes the widget JavaScript to update immediately and regenerates a new API key, even when no explicit save action is performed. This behavior can result in the widget returning 401 Unauthorized errors in production environments if the newly generated API key is not updated in the embedded widget code. Additionally, API key regeneration triggered by this action is not recorded in Team Auditing logs. Currently, audit entries are created only when changes are followed by an explicit save action, which makes it difficult for customers to track when and why an API key was changed. Improving visibility and consistency around API key changes would help customers manage widget integrations more reliably and avoid unexpected production issues.