X-Arowana-Signature header. Always verify it before processing the payload to ensure the request came from Arowana and wasn’t tampered with.
How it works
Read the raw request body
Use the exact HTTP body bytes. Do not parse and re-serialize JSON before verifying — this changes the byte sequence and breaks the signature.
Compute HMAC-SHA256
Sign the raw body bytes with your webhook secret using HMAC-SHA256. The expected value is
sha256= followed by the hex digest.Implementation
- Node.js
- Python
- Go
- Ruby
- PHP
- Java