Safe Webhooks in Switch
Posted: Thu Nov 20, 2025 2:19 pm
We use the default Webhook element in Switch for several different workflows. Some of these webhook endpoints are exposed to the internet through a proxy. Recently, we’ve run into scenarios where we need to tighten security on these endpoints to prevent spoofing, flooding attacks, and other vulnerabilities that come with publicly accessible URLs.
Is there any way to implement stronger security measures for Webhooks in Switch?
Specifically, we’re looking for support for features such as:
• Signature verification (e.g., HMAC-SHA256 using a shared client secret)
Ensures the payload was sent by a trusted source and has not been altered.
• IP allowlisting / restrictions
Limits access to approved IP ranges.
• Rate limiting / request throttling
Reduces the risk of DDoS or brute-force attacks.
• Token-based authentication (static bearer token or rotating token)
Requires a valid token to be included with each request.
• Replay-attack protection
Using timestamp + nonce validation to ensure each request is unique and recent.
• TLS enforcement & certificate validation
Guarantees encrypted transport and prevents downgrade attacks.
• Payload size limits
Prevents oversized requests intended to overload the server.
Or do we need to use a third party tool for this (webhookrelay.com or similar)?
Is there any way to implement stronger security measures for Webhooks in Switch?
Specifically, we’re looking for support for features such as:
• Signature verification (e.g., HMAC-SHA256 using a shared client secret)
Ensures the payload was sent by a trusted source and has not been altered.
• IP allowlisting / restrictions
Limits access to approved IP ranges.
• Rate limiting / request throttling
Reduces the risk of DDoS or brute-force attacks.
• Token-based authentication (static bearer token or rotating token)
Requires a valid token to be included with each request.
• Replay-attack protection
Using timestamp + nonce validation to ensure each request is unique and recent.
• TLS enforcement & certificate validation
Guarantees encrypted transport and prevents downgrade attacks.
• Payload size limits
Prevents oversized requests intended to overload the server.
Or do we need to use a third party tool for this (webhookrelay.com or similar)?