Webhook signature
To ensure that the webhook request is coming from the Apten API, you can verify the request by checking theX-Signature-SHA256 header. The X-Signature-SHA256 header contains a HMAC SHA256
signature of the request body using your webhook secret. You can verify the signature by
recomputing the HMAC signature using the request body and your webhook secret, and comparing
it to the value in the X-Signature-SHA256 header.
- Apten uses an HMAC hex digest to compute the hash.
- Make sure that you always handle the payload as UTF-8. Webhook payloads can contain unicode characters.
Avoid using a plain
== operator. A safer alternative includes
crypto.timingSafeEqual or compare_digest, which helps protect you from
certain timing attacks against regular equality operators.
