Security
Make sure you only accept trusted webhooks
Introduction
This guide explains how to validate webhook payloads from Quartr by verifying their cryptographic signatures. We strongly recommend that all consumers implement signature verification to prevent unauthorized or tampered webhook events. In addition to verifying the payload’s signature, you should also validate the timestamp to mitigate replay attacks.
How our webhook signatures work
Every webhook event sent by Quartr includes a cryptographic signature in the Webhook-Signature header. Signatures are computed over three elements:
webhook-id.webhook-timestamp.payload
webhook-id
: A unique message identifier (not user-controlled).webhook-timestamp
: The Unix timestamp (in seconds) at which the message was generated.payload
: The raw request body (minified JSON).
For example, for the following webhook:
The string you must sign is
Multiple signatures can appear when a user rotates their secrets. See Rotating webhook secrets below.
Rotating webhook secrets
If you rotate your webhook secret via the Quartr Dashboard, we will start signing requests with both the old and new secret for 24 hours to allow a seamless transition. During that window:
- The Webhook-Signature header will include multiple signatures (e.g.,
v1,<new_signature> v1,<old_signature>
). - You can verify against both secrets. Once you find a match, you can trust the request.
After the rotation window (24 hours), we drop the old secret from the payload entirely. At that point, only the new secret is used, and the old secret should be removed from your verification logic.
Verifying webhook signatures
Parse the headers and body
Extract the following from the incoming request:
Webhook-Id
Webhook-Timestamp
Webhook-Signature
- The raw request body (minified JSON)
Validate the timestamp (optional)
Compare the webhook-timestamp header to the current time. If it is too old (e.g., more than 5 minutes or 10 minutes), you should reject it to protect against replay attacks. For example:
Verify the HMAC signature
-
Split the Webhook-Signature header by spaces, because there may be multiple signatures following a secret rotation. For example,
v1,h6Yyyr... v1,XYZ...
-
Construct the signed payload:
- Compute the HMAC-SHA256 of
signedPayload
using your secret. When using the secret one should remove the whsec_ prefix and decode the base64 string. For example:
- Compare the result with all the available signatures in the Webhook-Signature header. If any of the available versions match, the payload is authentic and can be trusted.
Any modification of the payload, webhook-id, or webhook-timestamp will break the signature validation.
Examples
Here’s an example of how to verify webhook signatures in Node.js:
Was this page helpful?