Integrations

Verified inbound webhooks for your stack.

Charon Gate verifies signatures natively for the providers below — exactly the way each one prescribes — and applies the same retry, DLQ, and replay machinery uniformly. Anything else uses the generic HMAC verifier.

Provider not listed? Use the generic HMAC endpoint — same DLQ, replay, and retry behaviour, you bring your own signing secret. Or ask us to add first-party support.

Roadmap — native verifiers in flight

These providers work today through the generic HMAC endpoint. Native verifiers are on the roadmap so signature handling matches each provider’s exact spec. Want one prioritised? [email protected].

Slack

X-Slack-Signature, HMAC-SHA256 over v0:{ts}:{body}

Use via Custom HMAC →

Mailgun

X-Mailgun-Signature-V2, HMAC-SHA256 over timestamp+token

Use via Custom HMAC →

Twilio

X-Twilio-Signature, HMAC-SHA1 over URL+sorted params

Use via Custom HMAC →

SendGrid

ECDSA over body, public-key verification

Use via Custom HMAC →

Plaid

JWT-signed webhook with rotating verification keys

Use via Custom HMAC →

Intercom

X-Hub-Signature, HMAC-SHA1 over body

Use via Custom HMAC →