webhook-integration
Audited by Socket on Mar 18, 2026
1 alert found:
SecurityThis repository contains example implementations for webhook sending, receiving, queuing, and testing that align with the stated purpose. I found no evidence of malware or intentional backdoors. Main risks are implementation and configuration pitfalls rather than malicious code: signature verification uses JSON.stringify(req.body) instead of the preserved raw body (leading to potential verification failures), timingSafeEqual is used without length checks (can throw on malformed signatures), timestamp parsing is brittle, logging may leak sensitive payloads, and sample code shows placeholder secrets and unvalidated endpoint URLs. These are security/robustness issues to fix before production use (use req.rawBody for HMAC, validate header presence/format, check buffer lengths before timingSafeEqual, sanitize logs, validate webhook URLs and avoid hard-coded secrets).