Webhooks
Receive events from anywhere.
Every workflow can have a unique webhook URL that triggers a run when called. Built for the wild west of third-party integrations: HMAC verification, idempotency, replay, and inspection.
Unique URLs per workflow
Each webhook gets a stable URL you can paste into any service. Disable, rotate, or delete instantly.
Verification and security
HMAC SHA-256 verification, IP allowlists, and Bearer token auth — pick the strategy that matches the upstream service.
Idempotency and replay
Set an idempotency key header to dedupe duplicate calls. Replay any past webhook with one click for debugging or recovery.