coderabbit-webhooks-events
Facilitates secure handling of CodeRabbit webhooks with signature validation and event processing for reliable integrations.
Install this skill
Security score
The coderabbit-webhooks-events skill was audited on Feb 21, 2026 and we found 42 security issues across 4 threat categories. Review the findings below before installing.
Categories Tested
Security Issues
Template literal with variable interpolation in command context
| 72 | const signedPayload = `${timestamp}.${payload.toString()}`; |
Template literal with variable interpolation in command context
| 108 | console.log(`Unhandled event type: ${event.type}`); |
Template literal with variable interpolation in command context
| 114 | console.log(`Processed ${event.type}: ${event.id}`); |
Template literal with variable interpolation in command context
| 116 | console.error(`Failed to process ${event.type}: ${event.id}`, error); |
Template literal with variable interpolation in command context
| 130 | const key = `coderabbit:event:${eventId}`; |
Template literal with variable interpolation in command context
| 136 | const key = `coderabbit:event:${eventId}`; |
Curl to non-GitHub URL
| 148 | curl -X POST https://webhook.site/your-uuid \ |
Curl to non-GitHub URL
| 189 | curl -X POST https://your-ngrok-url/webhooks/coderabbit \ |
Webhook reference - potential data exfiltration
| 2 | name: coderabbit-webhooks-events |
Webhook reference - potential data exfiltration
| 4 | Implement CodeRabbit webhook signature validation and event handling. |
Webhook reference - potential data exfiltration
| 5 | Use when setting up webhook endpoints, implementing signature verification, |
Webhook reference - potential data exfiltration
| 7 | Trigger with phrases like "coderabbit webhook", "coderabbit events", |
Webhook reference - potential data exfiltration
| 8 | "coderabbit webhook signature", "handle coderabbit events", "coderabbit notifications". |
Webhook reference - potential data exfiltration
| 15 | # CodeRabbit Webhooks & Events |
Webhook reference - potential data exfiltration
| 18 | Securely handle CodeRabbit webhooks with signature validation and replay protection. |
Webhook reference - potential data exfiltration
| 21 | - CodeRabbit webhook secret configured |
Webhook reference - potential data exfiltration
| 26 | ## Webhook Endpoint Setup |
Webhook reference - potential data exfiltration
| 36 | app.post('/webhooks/coderabbit', |
Webhook reference - potential data exfiltration
| 62 | const secret = process.env.CODERABBIT_WEBHOOK_SECRET!; |
Webhook reference - potential data exfiltration
| 67 | console.error('Webhook timestamp too old'); |
Webhook reference - potential data exfiltration
| 141 | ## Webhook Testing |
Webhook reference - potential data exfiltration
| 145 | coderabbit webhooks trigger resource.created --url http://localhost:3000/webhooks/coderabbit |
Webhook reference - potential data exfiltration
| 147 | # Or use webhook.site for debugging |
Webhook reference - potential data exfiltration
| 148 | curl -X POST https://webhook.site/your-uuid \ |
Webhook reference - potential data exfiltration
| 155 | ### Step 1: Register Webhook Endpoint |
Webhook reference - potential data exfiltration
| 156 | Configure your webhook URL in the CodeRabbit dashboard. |
Webhook reference - potential data exfiltration
| 159 | Use the signature verification code to validate incoming webhooks. |
Webhook reference - potential data exfiltration
| 168 | - Secure webhook endpoint |
Webhook reference - potential data exfiltration
| 176 | | Invalid signature | Wrong secret | Verify webhook secret | |
Webhook reference - potential data exfiltration
| 183 | ### Testing Webhooks Locally |
Webhook reference - potential data exfiltration
| 188 | # Send test webhook |
Webhook reference - potential data exfiltration
| 189 | curl -X POST https://your-ngrok-url/webhooks/coderabbit \ |
Webhook reference - potential data exfiltration
| 195 | - [CodeRabbit Webhooks Guide](https://docs.coderabbit.com/webhooks) |
Webhook reference - potential data exfiltration
| 196 | - [Webhook Security Best Practices](https://docs.coderabbit.com/webhooks/security) |
Ngrok tunnel reference
| 185 | # Use ngrok to expose local server |
Ngrok tunnel reference
| 186 | ngrok http 3000 |
Ngrok tunnel reference
| 189 | curl -X POST https://your-ngrok-url/webhooks/coderabbit \ |
Access to .env file
| 62 | const secret = process.env.CODERABBIT_WEBHOOK_SECRET!; |
Access to .env file
| 127 | const redis = new Redis(process.env.REDIS_URL); |
External URL reference
| 145 | coderabbit webhooks trigger resource.created --url http://localhost:3000/webhooks/coderabbit |
External URL reference
| 148 | curl -X POST https://webhook.site/your-uuid \ |
External URL reference
| 189 | curl -X POST https://your-ngrok-url/webhooks/coderabbit \ |