Webhook Receiver Security Model
Treat incoming webhook endpoints as secure ingestion APIs. Wacht signatures follow the Standard Webhooks format, so you can use standard verifiers directly.Mandatory sequence
- Validate signature headers.
- Verify signature against raw body.
- Validate envelope and event type.
- Enqueue async processing.
- Return
2xxquickly.
Headers used by Wacht
webhook-idwebhook-timestampwebhook-signature
Envelope shape
Source of truth for integrators
- Signature Verification with Raw Body
- Event Envelope and Payload Contracts
- Webhooks Backend API Reference
API contract examples
1) Signature verification input
Use this canonical message format for verification:2) Event envelope consumed by receivers
3) API reference for replay and delivery diagnostics
See Webhooks Backend API Reference.Go-live checklist
- Raw-body signature verification passes integration tests.
- Idempotency guard keyed by
webhook-idis deployed. - Queue-first processing path is in place.
- Replay runbook tested on staging data.
- Alerting for receiver failures and backlog is active.
