ToolypetMCP
intermediate4 minutessecurity

HMAC Webhook Security Chain

Implement complete webhook security: generate shared secret, sign payloads, and verify signatures.

hmacwebhooksignatureverificationapi

Cuándo usar esta receta

Implement webhook security like Stripe, GitHub, and Shopify use. HMAC signing ensures webhook payloads are authentic and untampered.

Pasos

1

Create shared secret

Indicación:Generate a 256-bit hex webhook signing secret
2

Sign the webhook payload

Indicación:Generate HMAC-SHA256 of payload '{"event":"payment.completed","amount":99.99}' using the secret
3

Verify signature match

Indicación:Regenerate HMAC with the same payload and secret to verify signatures match (simulating receiver)
4

Timestamp Converter

Probar esta herramienta

Add replay protection

Indicación:Include a timestamp in the signature to prevent replay attacks — show current Unix timestamp

Preguntas frecuentes

How do I prevent webhook replay attacks?

Include a timestamp in the signed payload. Reject requests older than 5 minutes. Some implementations also include a nonce (unique ID per request) to prevent exact replays.

What if the HMAC doesn't match?

Return 401 Unauthorized and log the attempt. Common causes: wrong secret, payload modification by middleware (whitespace, encoding), or using the wrong HMAC algorithm.

Recetas relacionadas