Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.centryos.xyz/llms.txt

Use this file to discover all available pages before exploring further.

To ensure security and verify that webhook requests genuinely come from our servers, each webhook request is signed using a SHA-512 HMAC hash.

How it works

  1. Secret Key: You are provided with a unique secret key when configuring your webhook.
  2. Payload Hashing: We compute a SHA-512 HMAC of the raw request body using your secret key.
  3. Signature Header: The resulting hash is included in the request headers under the signature field.

Example Header

signature: 21fa4b457c...<truncated hash>...8c3e19d