Webhook

Implement secure webhook receivers and senders with proper verification and reliability.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "Webhook" with this command: npx skills add ivangdavila/webhook

Receiving: Signature Verification

  • Always verify HMAC signature—payload can be forged; don't trust without signature
  • Common pattern: HMAC-SHA256(secret, raw_body) compared to header value
  • Use raw body bytes—parsed JSON may reorder keys, breaking signature
  • Timing-safe comparison—prevent timing attacks on signature check
  • Reject missing or invalid signature with 401—log for investigation

Receiving: Replay Prevention

  • Check timestamp in payload or header—reject if too old (>5 minutes)
  • Combine with signature—timestamp without signature can be forged
  • Store processed event IDs—reject duplicates even within time window
  • Clock skew tolerance: allow 1-2 minutes past—but not hours

Receiving: Idempotency (Critical)

  • Webhooks can arrive multiple times—sender retries on timeout, network issues
  • Use event ID for deduplication—store processed IDs in database/Redis
  • Make handlers idempotent—same event twice should have same effect
  • Idempotency window: keep IDs for 24-72h—balance storage vs protection

Receiving: Fast Response

  • Return 200/202 immediately—process asynchronously in queue
  • Senders timeout (5-30s typical)—slow processing = retry = duplicates
  • Minimal validation before 200—signature check, then queue
  • Background job for actual processing—failures don't affect acknowledgment

Receiving: Error Handling

  • 2xx = success, sender won't retry
  • 4xx = permanent failure, sender may stop retrying—use for bad signature, unknown event type
  • 5xx = temporary failure, sender will retry—use for downstream issues
  • Log full payload on error—helps debugging; redact sensitive fields

Sending: Retry Strategy

  • Exponential backoff: 1min, 5min, 30min, 2h, 8h—then give up or alert
  • Cap retries (5-10 attempts)—don't retry forever
  • Record delivery attempts—show status to user
  • Different retry for 4xx vs 5xx—4xx often means stop retrying

Sending: Signature Generation

  • Include timestamp in signature—prevents replay of captured webhooks
  • Sign raw JSON body—document exact signing algorithm
  • Header format: t=timestamp,v1=signature—allows versioned signatures
  • Provide verification code examples—reduce integration friction

Sending: Timeouts

  • 5-10 second timeout—don't wait forever for slow receivers
  • Treat timeout as failure—retry later
  • Don't follow redirects—or limit to 1-2; prevents redirect loops
  • Validate HTTPS certificate—don't skip verification

Event Design

  • Include event type: {"type": "order.created", ...}—receivers filter by type
  • Include timestamp: ISO 8601 with timezone—for ordering and freshness
  • Include full resource or ID—prefer full data; saves receiver a lookup
  • Version events: api_version field—allows breaking changes

Delivery Tracking

  • Log every attempt: URL, status code, response time, response body
  • Dashboard for retry queue—let users see pending/failed deliveries
  • Manual retry button—for stuck webhooks after receiver fix
  • Webhook logs retention: 7-30 days—balance debugging vs storage

Security Checklist

  • HTTPS only—never send webhooks to HTTP endpoints
  • Rotate secrets periodically—support multiple active secrets during rotation
  • IP allowlisting optional—document your IP ranges if offered
  • Don't include secrets in payload—webhook URL should be secret enough
  • Rate limit per endpoint—one slow receiver shouldn't affect others

Common Mistakes

  • No signature verification—anyone can POST fake events to your endpoint
  • Processing before responding—timeout causes retries, duplicate processing
  • No idempotency handling—double charges, duplicate records
  • Trusting event data blindly—always verify by fetching from source API for critical actions

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

yuqing-bitable-and-label

Incrementally sync data from XiaoAi API to Feishu Bitable and optionally auto-label records with machine-based type and sentiment annotations.

Registry SourceRecently Updated
General

张律师综合套装

张律师法律AI中台 - 中国首个开源法律AI技能库,涵盖刑事辩护、民商事诉讼、合同审查全流程

Registry SourceRecently Updated
General

刑事辩护

刑事辩护全流程AI助手 - 6大阶段21个模板,从接案到执行全覆盖

Registry SourceRecently Updated