whop-app-integration

End-to-end implementation guide for adding Whop licensing to apps with a secure backend, activation flow, and webhook synchronization. Use when tasks involve Whop checkout setup, membership/license activation, validate_license integration, webhook signature verification, revocation handling, device-binding policies, or periodic license checks in Node.js, Python, iOS, or macOS apps.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "whop-app-integration" with this command: npx skills add jpkovas/whop-app-integration/jpkovas-whop-app-integration-whop-app-integration

Whop App Integration

Overview

Implement Whop licensing using a backend-first architecture, then connect app activation UX, periodic revalidation, and webhook-driven entitlement sync.

Required Architecture

  • Keep Whop API keys only on backend services.
  • Route requests as app -> backend -> Whop API.
  • Process Whop webhooks on backend and persist entitlement state locally.
  • Reject client-only designs that send Authorization: Bearer Whop keys from app code.

Workflow

  1. Define entitlement policy before coding
  • Choose plan model: subscription or perpetual.
  • Define device policy: one device, up to N devices, or manual transfer.
  • Define offline grace policy and revocation timing.
  • Persist these as explicit backend config.
  1. Configure Whop assets
  • Configure product and plans; confirm each purchase_url.
  • Create API key with minimum scopes required by the chosen endpoints.
  • Configure webhook endpoint and secret.
  • Enable at least: membership.activated, membership.deactivated, membership.cancel_at_period_end_changed.
  1. Implement backend contract
  • Implement POST /api/license/activate that receives license input and hwid, then calls Whop license validation.
  • Implement POST /api/webhooks/whop and verify signature before processing payload.
  • Store entitlements keyed by Whop membership id and user id.
  • Make webhook handling idempotent.
  1. Implement app activation
  • Build input UI for license key and loading/error states.
  • Send activation requests only to backend endpoints.
  • Store only activation status, timestamps, and non-secret metadata in app storage.
  • Present user-safe messages for invalid license, conflict, and connectivity failures.
  1. Implement periodic validation
  • Revalidate on launch and on time interval (for example every 24h).
  • Reuse the same metadata strategy used during activation.
  • If offline, apply a bounded grace window before disabling paid access.
  1. Implement cancellation and revocation sync
  • Revoke local entitlement on membership.deactivated.
  • Update renewal state on cancel-at-period-end changes.
  • Treat webhook events as source of truth for passive status changes.
  1. Complete release checks
  • Test activation success, mismatch, and not-found cases.
  • Test webhook signature pass/fail handling.
  • Test transfer/reset behavior if supported by product policy.
  • Test offline grace expiration behavior.

Implementation Rules

  • Read references/implementation-playbook.md for endpoint matrix, payloads, and error mappings.
  • Read references/platform-recipes.md for Node, Python, and Swift implementation recipes.
  • Use scripts/verify_whop_webhook.py to test signature verification with captured payloads.
  • Prefer current official Whop docs when endpoint versions differ from existing code.
  • Keep structured logs with request id, membership id, event type, HTTP status, and API error body.

Output Requirements

When using this skill in a task:

  1. Deliver backend route(s), webhook handler(s), and app activation flow updates.
  2. Add or update automated tests for activation, webhook verification, and revocation.
  3. Document security-sensitive implementation choices in changed files.
  4. Return a checklist that separates completed items from pending items.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

uiux-excellence-guide

No summary provided by upstream source.

Repository SourceNeeds Review
Security

code-audit-readonly

No summary provided by upstream source.

Repository SourceNeeds Review
General

roadmap-phase-normalizer

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

openclaw-version-monitor

监控 OpenClaw GitHub 版本更新,获取最新版本发布说明,翻译成中文, 并推送到 Telegram 和 Feishu。用于:(1) 定时检查版本更新 (2) 推送版本更新通知 (3) 生成中文版发布说明

Archived SourceRecently Updated