webhook-handler-patterns

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • [Prompt Injection] (SAFE): No instructions designed to override agent behavior or bypass safety filters were detected. The content is purely instructional documentation.
  • [Data Exposure & Exfiltration] (SAFE): No sensitive file access, hardcoded credentials, or unauthorized network operations were found. Code snippets correctly use environment variables as placeholders for secrets.
  • [Indirect Prompt Injection] (SAFE): While the skill describes handlers for untrusted external data (webhooks), it prioritizes signature verification as the mandatory first step in its sequence. Evidence Chain: 1. Ingestion points: Webhook POST endpoints in Express, Next.js, and FastAPI examples. 2. Boundary markers: Explicit 'Verify signature first' requirement in the handler sequence. 3. Capability inventory: Database writes and queueing operations. 4. Sanitization: Use of provider-specific SDKs (e.g., Stripe) for cryptographic payload validation.
  • [Unverifiable Dependencies] (SAFE): The skill references standard, reputable Node.js packages like express, stripe, and bull within code examples. No malicious or untrusted remote code execution patterns were identified.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 05:39 PM