webhook-handler-patterns
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- [Prompt Injection] (SAFE): No instructions designed to override agent behavior or bypass safety filters were detected. The content is purely instructional documentation.
- [Data Exposure & Exfiltration] (SAFE): No sensitive file access, hardcoded credentials, or unauthorized network operations were found. Code snippets correctly use environment variables as placeholders for secrets.
- [Indirect Prompt Injection] (SAFE): While the skill describes handlers for untrusted external data (webhooks), it prioritizes signature verification as the mandatory first step in its sequence. Evidence Chain: 1. Ingestion points: Webhook POST endpoints in Express, Next.js, and FastAPI examples. 2. Boundary markers: Explicit 'Verify signature first' requirement in the handler sequence. 3. Capability inventory: Database writes and queueing operations. 4. Sanitization: Use of provider-specific SDKs (e.g., Stripe) for cryptographic payload validation.
- [Unverifiable Dependencies] (SAFE): The skill references standard, reputable Node.js packages like
express,stripe, andbullwithin code examples. No malicious or untrusted remote code execution patterns were identified.
Audit Metadata