Skip to content
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
fix(triggers): make challenge signature verification mandatory, not o…
…ptional
  • Loading branch information
waleedlatif1 committed Apr 6, 2026
commit 78bec790bab86f217c493992d951cd33f0ce3d26
14 changes: 8 additions & 6 deletions apps/sim/lib/webhooks/providers/zoom.ts
Original file line number Diff line number Diff line change
Expand Up @@ -143,12 +143,14 @@ export const zoomHandler: WebhookProviderHandler = {
// Verify the challenge request's signature to prevent HMAC oracle attacks
const signature = request.headers.get('x-zm-signature')
const timestamp = request.headers.get('x-zm-request-timestamp')
if (signature && timestamp) {
const rawBody = JSON.stringify(body)
if (!validateZoomSignature(secretToken, signature, timestamp, rawBody)) {
logger.warn(`[${requestId}] Zoom challenge request failed signature verification`)
return null
}
if (!signature || !timestamp) {
logger.warn(`[${requestId}] Zoom challenge request missing signature headers — rejecting`)
return null
}
const rawBody = JSON.stringify(body)
Comment thread
waleedlatif1 marked this conversation as resolved.
if (!validateZoomSignature(secretToken, signature, timestamp, rawBody)) {
logger.warn(`[${requestId}] Zoom challenge request failed signature verification`)
return null
}
Comment thread
waleedlatif1 marked this conversation as resolved.

const hashForValidate = crypto
Expand Down
Loading