Skip to content

[SECURITY] E5-4: Webhook payloads not signed β€” no X-Aegis-Signature headerΒ #1441

@OneStepAt4time

Description

@OneStepAt4time

Finding

ID: Enterprise Gap | Severity: 🟠 MEDIUM

No X-Aegis-Signature header on outbound webhooks. Receivers cannot verify payload authenticity.

Fix Required

  1. Add webhookSecret?: string to webhook channel config
  2. Sign payload with HMAC-SHA256(webhookSecret, body) and include as X-Aegis-Signature: sha256=<hex>

Files: src/channels/webhook.ts, src/config.ts

Acceptance Criteria

Webhook receiver validates X-Aegis-Signature and rejects tampered payloads.

Milestone

M-E5: API & Integration

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions