Webhook Signature Verification
Learn how to verify webhook authenticity using HMAC-SHA256 signatures to secure your integration.
Why Verify Signatures?
Without signature verification, anyone could send fake webhook requests to your server, potentially:
- Crediting accounts without payment
- Triggering fraudulent order fulfillment
- Manipulating your business logic
Always verify signatures to ensure requests genuinely came from BlockEden.xyz.
How It Works
BlockEden.xyz signs every webhook request using HMAC-SHA256:
signature = HMAC-SHA256(your_webhook_secret, raw_request_body)
The signature is sent in the x-eden-signature
HTTP header. Your server must:
- Read the raw request body (before parsing)
- Compute the expected signature using your secret
- Compare it with the received signature
- Only process the event if signatures match