Skill
Community

creating-webhook-handlers

Install
1
Install the plugin
$
npx claudepluginhub jeremylongshore/claude-code-plugins-plus-skills --plugin webhook-handler-creator

Want just this skill?

Then install: npx claudepluginhub u/[userId]/[slug]

Description

Create webhook endpoints with signature verification, retry logic, and payload validation. Use when receiving and processing webhook events. Trigger with phrases like "create webhook", "handle webhook events", or "setup webhook handler".

Tool Access

This skill is limited to using the following tools:

ReadWriteEditGrepGlobBash(api:webhook-*)
Supporting Assets
View in Repository
references/errors.md
references/examples.md
references/implementation.md
Skill Content

Creating Webhook Handlers

Overview

Create secure webhook receiver endpoints with HMAC signature verification, idempotent event processing, and automatic retry handling. Support ingestion from providers like Stripe, GitHub, Twilio, and Slack with provider-specific signature validation schemes and payload parsing.

Prerequisites

  • Web framework with raw body access (Express with express.raw(), FastAPI with Request.body())
  • Webhook provider credentials: signing secret or shared secret key
  • Persistent storage for idempotency tracking (Redis or database table for processed event IDs)
  • Queue system for async processing (optional: Bull, Celery, SQS)
  • ngrok or similar tunnel for local development testing

Instructions

  1. Examine existing route definitions and middleware using Grep and Read to identify where webhook endpoints integrate into the application.
  2. Create a dedicated webhook route (e.g., POST /webhooks/:provider) that captures the raw request body before any JSON parsing middleware runs.
  3. Implement HMAC-SHA256 signature verification by computing HMAC(raw_body, signing_secret) and comparing against the provider's signature header (X-Hub-Signature-256, Stripe-Signature, X-Twilio-Signature).
  4. Add idempotency protection by storing processed event IDs (e.g., evt_xxx) in Redis or a database table, rejecting duplicates with 200 OK to prevent provider retries.
  5. Parse the event type from the payload (event.type, action, EventType) and route to the appropriate handler function using a dispatch map.
  6. Respond with 200 OK immediately, then enqueue the event payload for asynchronous processing to avoid webhook timeout failures.
  7. Implement dead-letter handling for events that fail processing after maximum retry attempts, logging the full payload for manual inspection.
  8. Write tests that replay recorded webhook payloads with valid and tampered signatures to verify acceptance and rejection behavior.

See ${CLAUDE_SKILL_DIR}/references/implementation.md for the full implementation guide.

Output

  • ${CLAUDE_SKILL_DIR}/src/webhooks/receiver.js - Webhook endpoint with signature verification
  • ${CLAUDE_SKILL_DIR}/src/webhooks/handlers/ - Per-event-type handler functions
  • ${CLAUDE_SKILL_DIR}/src/webhooks/verify.js - HMAC signature verification utilities
  • ${CLAUDE_SKILL_DIR}/src/webhooks/idempotency.js - Duplicate event detection logic
  • ${CLAUDE_SKILL_DIR}/src/queues/webhook-processor.js - Async event processing queue worker
  • ${CLAUDE_SKILL_DIR}/tests/webhooks/ - Replay tests with recorded payloads

Error Handling

ErrorCauseSolution
401 Signature MismatchHMAC verification failed against provider signatureLog the expected vs. received signature (redacted); verify signing secret rotation status
400 Malformed PayloadRaw body is not valid JSON or missing required fieldsReturn 400 so provider marks delivery as failed; log raw body for debugging
200 OK (duplicate)Event ID already processed; idempotency guard triggeredReturn 200 to prevent provider retry loops; log duplicate detection for monitoring
504 Gateway TimeoutSynchronous processing exceeded provider timeout (typically 5-30s)Move processing to async queue; respond 200 immediately upon signature verification
500 Handler ExceptionBusiness logic threw unhandled error during processingCatch at dispatch layer; log full error with event payload; allow provider to retry

Refer to ${CLAUDE_SKILL_DIR}/references/errors.md for comprehensive error patterns.

Examples

Stripe payment webhook: Verify Stripe-Signature header using stripe.webhooks.constructEvent(), then dispatch payment_intent.succeeded to fulfill orders and charge.refunded to process refund credits.

GitHub push webhook: Validate X-Hub-Signature-256, parse push events, extract commit list, and trigger CI/CD pipeline via queue message.

Multi-provider router: Single /webhooks/:provider endpoint that loads provider-specific signature verifier and event schema from a registry, supporting Stripe, GitHub, Twilio, and custom providers.

See ${CLAUDE_SKILL_DIR}/references/examples.md for additional examples.

Resources

Stats
Stars1676
Forks210
Last CommitMar 11, 2026

Similar Skills