Webhook security and testing endpoints.
HiringCenter signs outbound webhook requests with the per-webhook endpoint secret and includes:
X-HiringCenter-Signature: t=<unix_timestamp>,v1=<hex_hmac>
During secret-rotation grace windows, the header can contain multiple v1 values:
X-HiringCenter-Signature: t=<unix_timestamp>,v1=<current_hex>,v1=<previous_hex>
Each v1 is computed as:
HMAC_SHA256(endpointSecret, t + "." + rawBody)
Verification rules:
- Use the exact raw request body bytes/string (no JSON parse + re-serialize).
- Parse
tand allv1values from the header. - Enforce timestamp tolerance (recommended: 300 seconds) for replay protection.
- Compute expected signature once:
expected = HMAC_SHA256(endpointSecret, t + "." + rawBody). - Compare in constant time.
- Accept if any provided
v1matches. - Parse JSON only after signature verification succeeds.
Node.js helper:
Code
Poll Webhook Event Data
GET
https://api.hiringcenterpro.com/v2
/webhooks/poll
Returns pollable event data for supported event types (currently prospect.created). Poll payload objects are Zapier-oriented and may include ISO 8601 timestamp fields (for example created_at, updated_at) in addition to Unix-millisecond fields.
query Parameters
eventTypestringDefault: prospect.created

