Stripe signs every webhook delivery with an HMAC-SHA256 signature in theDocumentation Index
Fetch the complete documentation index at: https://supahooks.ar27111994.dev/llms.txt
Use this file to discover all available pages before exploring further.
Stripe-Signature header. Before you wire Stripe to your real backend, use the Webhook Debugger to confirm that your signing secret is correct, inspect the full payload structure, and replay individual events without waiting for Stripe to resend them.
What you’ll accomplish
- Configure the actor to verify
Stripe-Signatureautomatically - Point your Stripe dashboard webhook URL at the generated endpoint
- Inspect captured events and confirm
signatureValid: true - Replay a specific event to staging after fixing downstream code
- Set up alerts for signature failures
Configure the actor for Stripe
Start the actor with the following input. Replacewhsec_replace_me with your actual Stripe webhook signing secret from the Stripe dashboard.
Set
forwardHeaders: true if your downstream receiver also validates Stripe-Signature. The actor preserves the original header when forwarding./info to retrieve the generated webhook URL and confirm the active webhook ID.
Point Stripe at your generated endpoint
Open the Stripe dashboard
Go to Developers → Webhooks in the Stripe dashboard and click Add endpoint.
Paste the generated URL
Copy the
/webhook/:id URL from /info and paste it into the Endpoint URL field.Select events
Choose the event types you want to test, such as
payment_intent.succeeded or checkout.session.completed.Inspect a captured event
After Stripe delivers an event, query/logs to see what was captured:
signatureValid: true confirms the actor verified the Stripe-Signature header against your signing secret.
To filter for a specific event type after JSON parsing is enabled:
Replay a Stripe event after fixing a bug
Once you fix the downstream handler, replay the original captured event to staging without waiting for Stripe to resend it:Set up alerts for signature failures
Add analerts block to your actor input and set alertOn to include signature_invalid:
Common failure patterns
| Signal | What it usually means | What to do |
|---|---|---|
signatureValid=false | Wrong signing secret, modified raw body, or stale timestamp tolerance | Verify the whsec_... secret and inspect the raw captured request before any downstream transformation |
| 5xx sender response | Your test profile is simulating a failure, or a custom script changed event.statusCode | Remove the forced status or replay a healthy event after the fix is deployed |
| Forwarding failures | The webhook was accepted but the downstream bridge failed later | Check the alertOn notifications for error or 5xx events, or review /system/metrics for forwarding error counts |