Webhooks let Secureagentics push event notifications directly to your systems in real time. When a monitored event occurs — such as an alert firing or a policy violation — Secureagentics sends an HTTP POST request containing event details to a URL you specify. Use webhooks to trigger your own workflows: create tickets, notify on-call teams, update dashboards, or feed events into a SIEM.Documentation Index
Fetch the complete documentation index at: https://docs.adrian.secureagentics.ai/llms.txt
Use this file to discover all available pages before exploring further.
Supported events
| Event type | When it fires |
|---|---|
alert.triggered | A configured alert fired based on your alert rules. |
policy.violated | An agent action violated an active security policy. |
agent.registered | A new agent was registered with your workspace. |
agent.error | An agent reported an error event. |
Create a webhook
- Dashboard
- API
Open webhook settings
Go to Settings → Webhooks in the Secureagentics dashboard, then click Add webhook.
Enter your endpoint URL
Enter the full HTTPS URL of the endpoint that will receive webhook events. The URL must be publicly accessible and respond to POST requests.
Select events
Choose the event types you want to subscribe to. You can select one or more from the supported events list.
Add a signing secret (recommended)
Enter a secret string that Secureagentics will use to sign each payload. You use this secret to verify that incoming requests genuinely came from Secureagentics. See Verify webhook signatures for details.
Webhook payload format
Secureagentics delivers events as JSON objects in the POST request body. All events share the same top-level structure.| Field | Type | Description |
|---|---|---|
id | string | Unique identifier for this event delivery. |
type | string | The event type (see Supported events). |
timestamp | string | ISO 8601 timestamp of when the event occurred. |
data | object | Event-specific payload. Contents vary by event type. |
The
id field is unique per delivery attempt. If Secureagentics retries a failed delivery, the retry carries the same id. Use this to deduplicate events in your handler.Verify webhook signatures
Secureagentics signs every webhook payload using HMAC-SHA256 and your webhook secret. The signature is sent in theX-Secureagentics-Signature header as a hex digest.
Verifying this signature confirms the request came from Secureagentics and that the payload was not tampered with in transit.
hmac.compare_digest in Python or crypto.timingSafeEqual in Node.js) to prevent timing attacks.
Retries
If your endpoint does not respond with a2xx status code within 10 seconds, Secureagentics treats the delivery as failed and retries it automatically.
Secureagentics retries up to 5 times with exponential backoff:
| Attempt | Delay after previous attempt |
|---|---|
| 1st retry | 1 minute |
| 2nd retry | 5 minutes |
| 3rd retry | 30 minutes |
| 4th retry | 2 hours |
| 5th retry | 8 hours |
- Respond with
200as quickly as possible. Offload any processing to a background job. - Make your handler idempotent using the event
idfield to deduplicate retried deliveries.
Test your webhook
Use the Send test event button to send a sample payload to your endpoint without waiting for a real event to occur.- Go to Settings → Webhooks.
- Click on your webhook to open its detail view.
- Click Send test event.
- Select an event type to test.
- Click Send.