Every webhook request from Leaf includes anDocumentation Index
Fetch the complete documentation index at: https://docs.withleaf.io/llms.txt
Use this file to discover all available pages before exploring further.
X-Leaf-Signature header. This header contains a base64-encoded HMAC SHA-256 digest of the request body, signed with the secret you provided when creating the webhook. Verify this signature before processing any payload.
How signature verification works
- Read the raw request body as bytes. Do not parse or reformat it first.
- Compute an HMAC SHA-256 digest of those bytes using your webhook secret as the key.
- Base64-decode the value from the
X-Leaf-Signatureheader. - Compare the two digests using a constant-time comparison function.
: and ,).
Code examples
Example payload
If you receive afieldCreated event, the signed body looks like:
IP addresses
Leaf uses cloud infrastructure and does not have a fixed range of IP addresses for webhook delivery. If your network architecture requires allow-listing, consider placing a load balancer or reverse proxy in a DMZ to receive webhook traffic and forward it to your internal systems.What to do next
- Alerts Overview for webhook setup and retry policy.
- Events reference for all event types and payload schemas.
- Alerts API Reference for endpoint details.

