Now in Beta — Get 100 free monitoring credits.No card required →

Watchflare Blog

The Complete Guide to Webhook Integrations for Monitoring

Connect your web monitoring stack directly into your internal tooling. A technical guide on consuming and securing monitoring webhooks.

Watchflare EngineeringCore Platform
April 14, 2026
8 min read

Why Webhooks Are Non-Negotiable

An intelligence platform that relies solely on email alerts is effectively an organizational silo. If you want true webhook monitoring integration, you need to pipe your data directly into the tools your operations team uses daily: Slack, Discord, custom internal dashboards, or automated AI workflows via tools like Zapier or Make.com.

The Watchflare Webhook Architecture

When Watchflare's backend job runner (powered by Supabase Edge Functions) detects a high-relevance finding, it immediately initiates a POST request to your configured webhook endpoint. Watchflare webhooks are designed with stability, retry-logic, and rigorous security in mind.

1. Security First: Verifying Signatures

Never trust unverified webhook payloads. A malicious actor could flood your endpoint with fake competitor pricing updates, causing operational chaos. Watchflare signs every webhook request using HMAC SHA-256.

Your server will receive a header: X-Watchflare-Signature. You must generate an HMAC hash of the raw request body using your private Watchflare Webhook Secret, and compare it against the provided header.


// Example: Verifying the Webhook in a Next.js / Supabase Backend
import crypto from 'crypto';

export async function POST(req: Request) {
  const payload = await req.text();
  const signature = req.headers.get('X-Watchflare-Signature');
  const secret = process.env.WATCHFLARE_WEBHOOK_SECRET;

  const expectedSignature = crypto
    .createHmac('sha256', secret)
    .update(payload)
    .digest('hex');

  if (crypto.timingSafeEqual(Buffer.from(signature), Buffer.from(expectedSignature))) {
    // Verified securely! Process the finding.
  }
}
      

2. Parsing the Payload

The webhook payload delivers a structured JSON object containing everything you need to trigger a downstream action. It includes the jobId, the url, the full aiSummary, and most importantly, the relevanceScore.

3. Routing Logic (Applying Thresholds)

When you consume the webhook, you shouldn't blindly alert your team on every request. Implement a routing controller based on the AI's relevance score:

  • Score 90-100 (Critical): Dispatch an immediate PagerDuty alert or a direct message to relevant executives.
  • Score 60-89 (Notable): Post a message in the #competitive-intel Slack channel using Slack's BlockKit for high readability.
  • Score < 60 (Background): Drop into an Airtable or Postgres database for historical charting and quarterly review.

Conclusion

Webhooks transform monitoring from a passive read-only experience into an active operational engine. By strictly verifying HMAC signatures and applying intelligent routing thresholds, your engineering team can build resilient, highly responsive intelligence networks.

Join the Intelligence Revolution

Ready to automate your Intelligence?

Stop manual tracking. Let Watchflare AI score relevance, detect changes, and deliver automated briefings for any topic you care about.

Coming Soon:Personalized Newsletter Engine