Skip to main content

front-webhook

Handles Front webhook events for support interactions, enabling conversation ingestion and message handling through API integrations.

Install this skill

or
0/100

Security score

The front-webhook skill was audited on Feb 9, 2026 and we found 31 security issues across 4 threat categories, including 2 high-severity. Review the findings below before installing.

Categories Tested

Security Issues

medium line 41

Template literal with variable interpolation in command context

SourceSKILL.md
41Buffer.from(`${timestamp}:`, 'utf8'),
medium line 160

Template literal with variable interpolation in command context

SourceSKILL.md
160return `inb_${decimalId.toString(36)}`
medium line 167

Curl to non-GitHub URL

SourceSKILL.md
167curl -H "Authorization: Bearer $FRONT_API_TOKEN" "https://api2.frontapp.com/inboxes" | jq '._results[] | {id, name}'
medium line 2

Webhook reference - potential data exfiltration

SourceSKILL.md
2name: front-webhook
medium line 3

Webhook reference - potential data exfiltration

SourceSKILL.md
3description: Handle Front webhook events for the support platform. Use when implementing conversation ingestion, message handlers, Front API integrations, or webhook signature verification.
medium line 7

Webhook reference - potential data exfiltration

SourceSKILL.md
7# Front Webhook Handler
medium line 9

Webhook reference - potential data exfiltration

SourceSKILL.md
9Front is the **source of truth for all conversations**. Every support interaction starts with a Front webhook.
medium line 11

Webhook reference - potential data exfiltration

SourceSKILL.md
11## ⚠️ CRITICAL: Webhooks Send PREVIEWS, Not Full Data
medium line 13

Webhook reference - potential data exfiltration

SourceSKILL.md
13**This is the #1 gotcha with Front integration.** Webhooks do NOT contain the full message body or sender email. You MUST fetch via API.
medium line 15

Webhook reference - potential data exfiltration

SourceSKILL.md
15## Key Insight: Webhooks Send PREVIEWS
medium line 17

Webhook reference - potential data exfiltration

SourceSKILL.md
17Front webhooks send **event previews**, NOT full data. You get:
medium line 50

Webhook reference - potential data exfiltration

SourceSKILL.md
50When creating/updating a webhook, Front sends a validation request:
medium line 60

Webhook reference - potential data exfiltration

SourceSKILL.md
60## Webhook Handler Pattern
low line 65

Webhook reference - potential data exfiltration

SourceSKILL.md
65const secret = process.env.FRONT_WEBHOOK_SECRET
low line 72

Webhook reference - potential data exfiltration

SourceSKILL.md
72const result = verifyFrontWebhook(payload, headers, { secret })
medium line 104

Webhook reference - potential data exfiltration

SourceSKILL.md
104For local testing, use a tunnel (ngrok) and point the Front webhook to the **exact** tunnel URL:
low line 108

Webhook reference - potential data exfiltration

SourceSKILL.md
108# Use the https URL printed by ngrok as the webhook target
medium line 111

Webhook reference - potential data exfiltration

SourceSKILL.md
111Do not use wildcard domains for webhook URLs.
medium line 113

Webhook reference - potential data exfiltration

SourceSKILL.md
113## Front Event Types (Application Webhooks)
medium line 115

Webhook reference - potential data exfiltration

SourceSKILL.md
115| Webhook Event | API Event | Description |
medium line 140

Webhook reference - potential data exfiltration

SourceSKILL.md
140- Webhook handler: `apps/front/app/api/webhooks/front/route.ts`
medium line 142

Webhook reference - potential data exfiltration

SourceSKILL.md
142- Signature verification: `packages/core/src/webhooks/verify.ts`
low line 186

Webhook reference - potential data exfiltration

SourceSKILL.md
186FRONT_WEBHOOK_SECRET= # App signing key (32-char hex)
high line 102

Ngrok tunnel reference

SourceSKILL.md
102## Local Dev (ngrok)
high line 104

Ngrok tunnel reference

SourceSKILL.md
104For local testing, use a tunnel (ngrok) and point the Front webhook to the **exact** tunnel URL:
medium line 107

Ngrok tunnel reference

SourceSKILL.md
107ngrok http 3000
medium line 108

Ngrok tunnel reference

SourceSKILL.md
108# Use the https URL printed by ngrok as the webhook target
low line 65

Access to .env file

SourceSKILL.md
65const secret = process.env.FRONT_WEBHOOK_SECRET
low line 128

Access to .env file

SourceSKILL.md
128const front = createFrontClient(process.env.FRONT_API_TOKEN)
low line 152

External URL reference

SourceSKILL.md
152- UI URL: `https://app.frontapp.com/settings/tim:571743/inboxes/edit/[PHONE]/settings`
low line 167

External URL reference

SourceSKILL.md
167curl -H "Authorization: Bearer $FRONT_API_TOKEN" "https://api2.frontapp.com/inboxes" | jq '._results[] | {id, name}'
Scanned on Feb 9, 2026
View Security Dashboard
Installation guide →