You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Inbound webhooks should be verified to ensure the payload really came from the sender. This receiver validates an `X-Signature` header containing an HMAC SHA-256 of the request body using a shared secret. Invalid signatures return HTTP 401.
5
+
6
+
## Where to use
7
+
- Scripted REST API resource script
8
+
- Include the `HmacUtils` Script Include in the same app or global
9
+
10
+
## How it works
11
+
- Reads raw request body and the `X-Signature` header
12
+
- Computes HMAC SHA-256 using the shared secret
13
+
- Compares in constant time to avoid timing attacks
14
+
- If valid, inserts the payload into a target table or queues it for processing
15
+
16
+
## Configure
17
+
- Set `SHARED_SECRET` (prefer credentials or encrypted properties)
0 commit comments