https://www.example.com/chunkr/webhooks/
.
Indicate that a webhook has been processed by returning a 2xx (status code 200-299) response to the webhook message within a reasonable time frame (15 seconds).
It’s also important to disable CSRF protection for this endpoint if your framework enables it by default.
Another important aspect of handling webhooks is verifying the signature and timestamp when processing them.
You can learn more about this in the signature verification section.
task.parse.updated
: Webhook event payload for parse task updateschunkr.ai
, or a third party that might be trying to exploit a vulnerability.
To avoid this, we send a signature in the header of our webhooks, which you can verify using a signing secret.
To verify the signatures, see Svix’s guide on how to verify webhooks with the Svix libraries or how to verify webhooks manually.