You should ensure that webhooks you received were sent by BundleUp. You can do this by verifying the webhook request signature and timestamp. BundleUp sends aDocumentation Index
Fetch the complete documentation index at: https://docs.bundleup.io/llms.txt
Use this file to discover all available pages before exploring further.
BundleUp-Signature HTTP header with every webhook request. This header contains a hex-encoded HMAC-SHA256 signature of the raw body contents, signed using the webhook’s signing secret. You can find the signing secret on the webhook’s detail page.
The parsed JSON body has a webhookTimestamp field with a UNIX timestamp, in milliseconds, indicating the time when the webhook was sent. We recommend that you verify it’s within a minute of the time your system sees it to guard against replay attacks.
To verify the webhook, you need to compute the signature of the request body using the webhook’s signing secret and compare it against the BundleUp-Signature header. It’s strongly recommended to use raw request body rather than restringifying a parsed JSON body, otherwise the signature may differ. Once the signature has been validated, check to ensure that the webhook timestamp is reasonably current before processing the request:

